Cyber security news for all

More

    The NjRat trojan captures access data to infect your PC

    NjRat is the first remote access trojan that gives the attackers full remote access to an infected computer .This is not the case for this type of trojan. Security researchers say: “The malware has made itself, compensating for various hacking tools and other installers that it turns into Trojans.” Other hackers have also been targeting the loud cybereason analysis for years of experience.

    The analysis revealed approximately 1000 njRat samples, which are fast leaving and downloading. It can be heard that a large number of people have been infected by these campaigns; even if no other figures can be counted from the current one.

    Njrat In The Center

    The Trojan njrat is mainly used in this context. It is a remote access Trojan that has been active since 2013, which gives attackers full remote access to an infected computer. As the cybereason researchers go on to say, the campaign has been going on for a long time. They also assume that a large number of people have already been infected, even if no exact figures can be published at this time.

    The campaign ultimately allows the threat actors to have full access to the target computer and thus to carry out their own attacks such as DDoS attacks or the theft of sensitive data. The actors behind this campaign use different servers, some of which apparently go back to hacked blogs. Others seem to be part of the group’s existing infrastructure, as can be inferred from various host names and DNS data. Cybereason will continue to monitor developments. The prepared hacking tools are published on popular hacker forums in order to achieve the greatest possible spread success through marketing. If the tools are then used, the original hackers are given access to the systems hacked with the tools, as well as to captured access information and data.

    Recent Articles

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Vodafone experiences a vulnerability with fatal effects

    The injected JavaScript can access the session cookies from Vodafone website and send them to a server. An attacker can take over the session...

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox