Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

The black market is no stranger to sketchy sales. Users can pay with Bitcoin for the development of malware and other threats without knowing the first thing about hacking or technology. However, this convenience comes at a price, as any users of the new Cobian botnet now know. The malware involved--njRAT--surfaced in 2015 and includes a lot of terrifying features. Hackers can use a keylogger, webcam control, remote code execution, and even screensharing, just by shelling out some Bitcoins to a fellow hacker.

What these would-be hackers don’t know is that the developers include encrypted code which allows them access to the master control switch of the botnet. In other words, while users are purchasing their own botnets to use for whatever they want, full control of any botnets purchased is held solely by the developer of Cobian.

NakedSecurity describes the way that the botnet masks its presence, as well as how the threat activates when it’s time for its master to take over: “Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

It just goes to show that you can never trust a hacker--but you probably already knew that. This story should be a lesson for businesses that don’t suspect they are at threat of a hacking attack. If anyone can access threats like a botnet, you’ll need to step up your defenses to keep your business safe. Total Tech Care can help with this task--to learn more, reach out to us at 866-348-2602.

 

Comments 1

Claudia Vlamingh on Thursday, 09 May 2019 05:43

Total technology support care is the technology support with the proper care of the blog of the section. The news is about the cyber criminals where you can get the nasty surprise at https://www.topratedessayservice.com/essaymama-com-review/ with the essay services of the easy mama platform of the digital system.

Total technology support care is the technology support with the proper care of the blog of the section. The news is about the cyber criminals where you can get the nasty surprise at https://www.topratedessayservice.com/essaymama-com-review/ with the essay services of the easy mama platform of the digital system.
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Passwords Windows 10 Virtualization Saving Money Holiday Tech Term Social Media Gadgets Chrome Managed Service Managed IT Services Automation Microsoft Office Computers Facebook Operating System Artificial Intelligence Cybercrime BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Spam Covid-19 Information Office 365 Telephone Systems Information Technology Managed Service Provider Alert Remote Router Bandwidth BDR Social Engineering Recovery Employer-Employee Relationship Mobility Mobile Computing Remote Monitoring Encryption Applications Application App History Law Enforcement Data Breach Big Data Human Resources Password Money How To Blockchain Mobile Office Paperless Office Data Storage Patch Management Government Office Tips Training Private Cloud VPN Managed IT Remote Computing Apps Marketing Mouse HaaS WiFi IT solutions Entertainment Website Budget Google Drive Vulnerability Infrastructure Windows 7 Avoiding Downtime Voice over Internet Protocol Word Wireless Servers Gmail Settings Bring Your Own Device Data Management Data Security Two-factor Authentication Work/Life Balance Flexibility Social Vendor End of Support User Error Education Physical Security Managed Services Display Telephone System Staff Software as a Service Safety Meetings Machine Learning Sports USB HIPAA Remote Work Redundancy Connectivity Employee/Employer Relationship Conferencing Keyboard Risk Management Hacker RMM Scam The Internet of Things Lithium-ion battery Vendor Management Save Time Data Protection Firewall Cleaning Virtual Reality Apple Network Congestion Access Control Value Battery Managed Services Provider eWaste Virtual Assistant Shadow IT Legal Database Spam Blocking Electronic Medical Records Authentication Printer Internet Exlporer Remote Workers Bluetooth Hiring/Firing Wearable Technology Processor Retail Hard Drives PDF Update Instant Messaging Robot Excel Hard Drive Proactive IT IT Consultant Google Docs Biometrics Identity Theft Virtual Desktop Best Practice Business Intelligence YouTube Computing Humor Black Market Audit Worker DDoS IT Management Augmented Reality Fraud Botnet SharePoint Document Management IT Plan Wireless Technology Digital Signage Remote Worker Solid State Drive How to Downtime Cryptocurrency Customer Service Unsupported Software Environment Data storage Charger Procurement Fax Server Automobile Workplace Strategy Comparison Net Neutrality Compliance Computer Care Virus OneNote SaaS Help Desk Current Events CES Computing Infrastructure Going Green Printing Telephony Unified Threat Management Samsung Computer Accessories Business Technology Content Management Point of Sale Millennials Laptop Personal Skype Cryptomining Printers Bloatware Techology Smart Office Cameras Wireless Charging Customers Supply Chain Management Data loss Batteries Outlook Leadership Audiobook Troubleshooting Tablets Monitoring Windows 8.1 Workforce Touchpad Digitize Start Menu Virtual Private Network Entrepreneur Loyalty Cables Windows Server 2008 R2 Screen Mirroring Frequently Asked Questions Shortcut Politics Books Advertising Customer relationships Cost Management Email Best Practices Telecommuting IT Assessment Mobile Manufacturing Windows 10s Project Management Nanotechnology Social Networking Printer Server Cortana Notifications Cast Managed IT Service Tip of the week Security Cameras webinar Emergency Digital Signature Computer Tips Virtual CIO OneDrive Professional Services Biometric Security Public Cloud Warranty Employer Employee Relationship Running Cable Assessment HVAC Google Apps Relocation Peripheral Using Data Windows Server 2008 Analysis Memory Digital Security Cameras Video Games Copiers Tools 5G Administrator Devices Television Enterprise Content Management Worker Commute Quick Tip Smartwatch MSP Experience Accountants Ergonomics Thought Leadership Scalability Credit Cards Development OLED Microchip Public Computer Password Management Business Owner Password Manager Science PCI DSS Virtual Machine Multi-Factor Security NarrowBand Fiber Optics Regulations Employee Transportation 2FA Twitter Search Messaging Cabling Computer Fan Search Engine Consultant Rootkit Distributed Denial of Service NIST Customer Relationship Management Analytics Business Mangement iPhone Policy Hypervisor Trending Trend Micro Workers Benefits Smart Tech Analyitcs Dark mode Addiction Programming Amazon SMS Default App FENG Best Available WIndows 7 IBM Recycling Files Procedure Saving Time dark theme Chromecast Shopping Flash Google Search Wiring Smart Technology Practices Cache Amazon Web Services AI IT Infrastructure Antivirus Software Tips Bing Supercomputer Safe Mode Criminal Windows 8 Colocation FinTech Uninterrupted Power Supply Social Network Sync Emails GDPR IT service Hosted Computing Wireless Internet Online Shopping Monitor Investment Employee/Employer Relationships User File Sharing PowerPoint Tablet Windows Media Player Employees Windows 365 Specifications ISP Netflix Camera Domains Two Factor Authentication Inventory Wire Evernote Reputation Video Conferencing Streaming Media ROI Root Cause Analysis Bitcoin HBO IaaS Managing Stress Shortcuts Knowledge Maintenance Content Music Sales Travel Tech Support

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code