Wednesday , 23 January 2019
Home 4 Security 4 Hackers probe PC security

Hackers probe PC security

Hackers probe PC securityCyber criminals are carrying out reconnaissance mission on PCs, so they can tailor their attacks, according to Security Company, when hackers find a computer that is vulnerable to attack, they infect it with a small piece of malicious software called a downloader this will initially “sniff” around the victim’s PC, looking for other vulnerabilities, it can find out which operating system and security software the victim is using, and by identifying the IP address, the software can identify in which country the victim lives and the internet service provider they use.

It will also look for other vulnerabilities in third party application, such as QuickTime, that the criminals can later exploit, other analysis is over, and the information is sent back to the servers used by the criminals controlling the attack, they can then tweak malicious software such as keystroke loggers and download the ones that can get the most information from the compromised PC.

From here the PC belongs to the criminal can used to carry out a variety of attack and if possible shut down the security software, this software us often polymorphic and will continually change its signature as it tries to outwit security software, the personal information, such as bank details, passwords and dates of birth can be used for identify theft and to drain bank account, the original attackers often used this information themselves as well as selling it on to other criminals.

The hijacked PC will also most likely become part of a Botnet, a collection of computer around the world that have been infected and are effectively under the control of the hacker, other criminal can lease the use of a Botnet by the hour for further criminal activities such as attacking web site, sending out spam or distributing more malicious sofrware, the criminal have even developed software that will control a PC’s webcam if it is switched on.

Check Also

Cloud Computing with Windows

By Roger Jennings Wiley Publishing, Inc.| English | 363 pages | PDF | 7.420 KB | Download | Password: cloud Cloud computing became a hot topic in mid-2008 and, by mid-2009, had achieved top buzzword status. As proof of its popularity, a mid-August 2009 search on for ‘‘cloud computing’’ returned 92 million hits. …

How one chat bot totally changed my opinion of bots

A couple of weeks ago, together with Sorted MGMT and Hardwell, we launched a messenger …

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.