Watch this video on YouTube.
It’s easy to let your guard down when you’re away. Hackers know that, too.
Tom Nipravsky, a security researcher at Deep Instinct, discovered another ‘never seen before’ malware that could transform a Windows PC into a botnet. Named as ‘Mylobot’, this malware has developed from the ‘Dark Web’. It was finished up in the wake of following its server that was additionally utilized by other malware from the dark web.
The powerful botnet is said to consolidate various noxious systems, generally including:
· Anti-VM techniques
· Anti-sandbox techniques
· Anti-debugging techniques
· Wrapping internal parts with an encrypted resource file
· Code injection
· Process hollowing (a technique where an attacker creates a new process in a suspended state and replaces its image with the one that is to be hidden)
· Reflective EXE (executing EXE files directly from memory, without having them on disk)
· A 14-day delay before accessing its C&C servers.
“On a daily basis we come across dozens of highly sophisticated samples, but this one is a unique collection of highly advanced techniques,” says Arik Solomon, vice president of R&D at Deep Instinct. “Each of the techniques is known and used by a few malicious samples, but the combination is unique.”
As indicated by the researcher, Mylobot likewise bears contrary to the botnet property. The reason, as indicated by the researcher, for this conduct being is, possibly to prevail upon the “opposition” on the dark web.
“Part of this malware process is terminating and deleting instances of other malware. It checks for known folders that malware “lives” in (“Application Data” folder), and if a certain file is running – it immediately terminates it and deletes its file. It even aims for specific folders of other botnets such as DorkBot.”
The researchers say it’s vital to take note that Mylobot was found in the wild, at a Level 1 communication and telecommunication equipment manufacturer and not in a proof-of-idea show.
Also, in conclusion the one thing they are extremely sure about is the modernity of the malware’s creators as, according to ZDNet, the real author(s) of this malware are yet obscure, be that as it may, the malware utilizes a similar server which is connected to the scandalous Locky ransomware, Ramdo, and DorkBot.
A security researcher says he’s found a way to guess iPhone lock codes without getting blocked after 10 mistakes.