Kaspersky Discovers Hidden Malware Attacks In 40 Countries
A security company recently discovered that 140 banks in 40 countries have been hacked with invisible malware. Researchers also have no clue who is behind the attacks. What's more troubling is that ATMs could be controlled remotely.
Security researchers from Kaspersky Lab have found out there is a series of "invisible" targeted attacks. It seems Meterpreter code along with some legitimate PowerShell scripts and other utilities were utilized. The malware would bury itself in the computer's memory to prevent being detected. The attackers, which may be after sensitive information collect passwords from system administrators.
Once the hackers have this information, the researches claim that the attackers had access to the machines. The company also says these attacks are pretty big in scale. More than 140 enterprise networks in a range of business sectors are affected by this. USA, France, Ecuador, Kenya, the UK and Russia are noted to have the most victims.
"The use of open source exploit code, common Windows utilities and unknown domains makes it almost impossible to determine the group responsible," said Kaspersky. "or even whether it is a single group or several groups sharing the same tools."
Sergey Golovanov from Kaspersky Lab also says, "The determination of attackers to hide their activity and make detection and incident response increasingly difficult explains the latest trend of anti-forensic techniques and memory-based malware."
According to Tempo, it seems that the attackers are also still on the loose. It must be noted that to detect an attack, it will only be possible in RAM, the network and registry.
Some time in late 2016, Kaspersky said cyber criminals were using as many as 24,000 computer systems to take down some sites. A few Russian banks were affected by a series of distributed denial of service (DDoS) cyber strikes. The attacks happened through a network of Internet of Things (IoT) devices found in 30 different countries.
PayPal Users Need To Be Cautious With This New Phishing Scam
Experts at ESET discovered a phishing scam that targets PayPal users.
Hotel Pays Ransom After Guests Are Locked In Rooms By Hackers
A hi-tech resort found in the Austria Alps was targeted by ransomware hackers for bitcoins.
Gmail Users Need To Be Careful With New Cyber Phishing Technique
A new phishing technique that mimics emails and provides an authentic looking Gmail sign-in page tricks users into providing private information.
Kaspersky Releases Free Decryption Tools For Dharma Ransomware
Someone leaked online free decryption keys for the Dharma ransomware and, after testing them, Kaspersky released the free decryptor for the malware.
Russian Banks Were Hit By IoT Botnet Cyber Strikes
This kind of attacks has also been made to major websites last month.
Many believe that this could have been done as retaliation for Russia´s alleged involvement in the U.S. elections.
MORE IN ITECHPOST
6 Must-Take Steps to Protect Yourself from a Data Breach
A data breach can take place in many ways. Whether it involves gaining physical access to your laptop or a malicious cyberattack on your device, the safety of your data could be easily compromised at any time.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?