NEWSORZO
No Result
View All Result
Tuesday, January 26, 2021
  • Home
  • Business
  • Tech
  • Startups
  • News
Subscribe
NEWSORZO
  • Home
  • Business
  • Tech
  • Startups
  • News
No Result
View All Result
NEWSORZO
No Result
View All Result
Home News

Hackers are targeting other hackers by infecting their tools with malware

by news
March 10, 2020
in News
0
152
SHARES
1.9k
VIEWS
Share on FacebookShare on Twitter

A newly discovered malware campaign suggests that hackers have themselves become the targets of other hackers, who are infecting and repackaging popular hacking tools with malware.

Cybereason’s Amit Serper found that the attackers in this years-long campaign are taking existing hacking tools — some of which are designed to exfiltrate data from a database through to cracks and product key generators that unlock full versions of trial software — and injecting a powerful remote-access trojan. When the tools are opened, the hackers gain full access to the target’s computer.

Serper said the attackers are “baiting” other hackers by posting the repackaged tools on hacking forums.

But it’s not just a case of hackers targeting other hackers, Serper told TechCrunch. These maliciously repackaged tools are not only opening a backdoor to the hacker’s systems, but also any system that the hacker has already breached.

“If hackers are targeting you or your business and they are using these trojanized tools it means that whoever is hacking the hackers will have access to your assets as well,” Serper said.

That includes offensive security researchers working on red team engagements, he said.

Serper found that these as-yet-unknown attackers are injecting and repackaging the hacking tools with njRat, a powerful trojan, which gives the attacker full access to the target’s desktop, including files, passwords, and even access to their webcam and microphone. The trojan dates back to at least 2013 when it was used frequently against targets in the Middle East. njRat often spreads through phishing emails and infected flash drives, but more recently hackers have injected the malware on dormant or insecure websites in an effort to evade detection. In 2017, hackers used this same tactic to host malware on the website for the so-called Islamic State’s propaganda unit.

Serper found the attackers were using that same website-hacking technique to host njRat in this most recent campaign.

According to his findings, the attackers compromised several websites — unbeknownst to their owners — to host hundreds of njRat malware samples, as well as the infrastructure used by the attackers to command and control the malware. Serper said that the process of injecting the njRat trojan into the hacking tools occurs almost daily and may be automated, suggesting that the attacks are run largely without direct human interaction.

It’s unclear for what reason this campaign exists or who is behind it.

Hackers are stealing years of call records from hacked cell networks

  • Trending
  • Comments
  • Latest

Amazon Seller Certifications Highlight Women and Veteran Owned Small Businesses

February 26, 2020
The Changing Role Of Airports IELTS Reading Answers

The Changing Role Of Airports IELTS Reading Answers

October 4, 2020
Techstars launches a digital space tech accelerator with USAF, the Netherlands and Norway

Teeoh’s avatar social platform aims to beat the odds

January 4, 2020
Best Hand Lettering Quotes For Inspiration

Best Hand Lettering Quotes For Inspiration

October 18, 2020
How to Leverage Traditional Marketing Channels to Drive Growth for Your Business

How to Leverage Traditional Marketing Channels to Drive Growth for Your Business

0
Red Dead Redemption PC is finally fixed, Rockstar promises

Red Dead Redemption PC is finally fixed, Rockstar promises

0
Techstars launches a digital space tech accelerator with USAF, the Netherlands and Norway

Techstars launches a digital space tech accelerator with USAF, the Netherlands and Norway

0
Techstars launches a digital space tech accelerator with USAF, the Netherlands and Norway

Crimson Tiring Redemption 2 PC gets a repair for stuttering – but it no doubt could perchance per chance also approach at a heed

0
How to Leverage Traditional Marketing Channels to Drive Growth for Your Business

How to Leverage Traditional Marketing Channels to Drive Growth for Your Business

January 25, 2021
Breaking Down Barriers — How Traditional Company Divisions Are a Thing of the Past

Breaking Down Barriers — How Traditional Company Divisions Are a Thing of the Past

January 25, 2021
5 Reasons Why You Should Hire a Marketing Agency in 2021

5 Reasons Why You Should Hire a Marketing Agency in 2021

January 24, 2021
Beginner’s Guide: How to Track Conversions with the Facebook Pixel

Beginner’s Guide: How to Track Conversions with the Facebook Pixel

January 24, 2021

Recent News

How to Leverage Traditional Marketing Channels to Drive Growth for Your Business

How to Leverage Traditional Marketing Channels to Drive Growth for Your Business

January 25, 2021
Breaking Down Barriers — How Traditional Company Divisions Are a Thing of the Past

Breaking Down Barriers — How Traditional Company Divisions Are a Thing of the Past

January 25, 2021

Categories

  • Business
  • News
  • Startups
  • Tech

Site Navigation

  • Privacy Policy
  • Disclaimer
  • Contact Us
  • Advertise
NEWSORZO

NEWSORZO is online business journal that focuses on providing news related to the business world, startups, economic developments and more.

© 2020 NEWSORZO - Online business journal that focuses on providing news related to the business world, startups, economic developments and more.

No Result
View All Result
  • Home
  • Business
  • Tech
  • News
  • Startups

© 2020 NEWSORZO - Online business journal that focuses on providing news related to the business world, startups, economic developments and more.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In