Skip to main content

Posts

Showing posts from April, 2020

SpyMax malware that targeted Libyan Individuals

Spy Max (Spyware) || Newly found malwares in 2020 || Explained SpyMax: It belongs to surveillance ware family, SpyMax was found targeting Libyan Individuals. It masqueraded as “Corona Live 1.1” to steal photos, media, files, Device location, as well as permission to take pictures and record videos of individuals from infected phone.

Jerusalem Electronic Army Hacked Israeli Water supply and Treatment Facility

Hackers Hacked Israeli Water supply Company || Jerusalem Electronic Army Targeted Israel`s water supply and treatment || Latest Tech News A Security alert sent by Israeli National Cyber-Directorate (INCD), the agency is urging personnel at companies active in energy and water sectors to change passwords of systems that are connected to internet. If passwords can`t be changed, the agency recommended taking systems offline. The INCD alert was issued on 23-04-2020. According to a report of Ynet, the water Authority told companies to change passwords “with emphasis on operational systems and chlorine control devices,” believed to have been targeted the most. This attack was done by Jerusalem Electronic Army (J.E.A). It is a group of Hacktivists. This group has presence on all social media sites such as Facebook, Instagram, WhatsApp, Twitter, and Telegram where they have posted the screenshots of systems which they claim to have hacked.

Shade Ransomware Finally Shuts down and releases nearly 750K decryption keys

Shade Ransomware Shuts down || Shade ransomware releases nearly 750K Decryption keys when shuts down || Latest Tech News Its operators have shut down their all operations and releases nearly 750,000 decryption keys and apologized from their victims for harm they caused. The operators behind the shade ransomware (Troldesh) were operating it since around 2014. Unlike other ransomware families that specially avoid encrypting victims in Russia and other CIS countries. Shade mainly targeted peoples of Russia and Ukraine. According to Michael Gillespie, the creator of ransomware identification site ID Ransomware submission related to Shade Ransomware has been steady over the years until the end of 2019 when it started to dwindle.

Symptoms that your computer is infected with Virus

Symptoms of Computer infected with Malware || Explained There are thousands of Symptoms of a computer infected with malware so they all are difficult to cover. The following are the some common symptoms that a victim may experience when he/she will use his/her computer:   Ø Computer does not start or it reboots automatically when it is on.   Ø Different types of error messages appear on screen.   Ø Registry files are deleted or thousands are created.   Ø Web Browser such as chrome, Mozilla Firefox do not run in a normal way. It loads websites slow.   Ø New files and folders are created on Hard disk without any human action   Ø Hard Disk Activity is noticed   Ø Shortcuts of different files or folders are created.

Basic Data Transmission Terminologies that Every User must know

Data Transmission Terminologies || Explained The following are some Data Transmission Terminologies:   Ø Data Rate   Ø Baud Rate   Ø Bandwidth   Ø Signal-to-Noise Ratio Bandwidth: It is an overall Data Transmission Capacity of a medium or channel. It represents the amount of data that passes through a network connection per unit of time. It is measured in bits/Second or B/S Baud Rate: Baud Rate is the rate of change of digital signals per second during data communication. An electrical signal can have two or more than two states to represent binary digits 0 and 1 Data Rate: Data Rate is the speed with which data can be transmitted from one device to another. It is generally measured in Kbps and Mbps Signal-to-Noise Ratio: Signal to noise ratio is the ratio of signal power to the noise power that causes error in data transmission. If a transmission line has Signal-to-noise ratio higher than 1:1 so it means that the more Signal Transmission than Noise.

Characteristics that Communication System must Have

Characteristics of a Good Communication System || Explained The following are three characteristics of Good Communication System: Ø Delivery Ø Accuracy Ø Timeliness Timeliness: System must deliver message within a specified time without any significant delay. The Data Delivered late may be useless. It is important in Real Time Transmission such as video conferencing that audio and video must be delivered as soon as they are produced. Delivery: Data communication system must deliver message to the correct address/Destination. Message must be received only by the user to whom it is addressed. Accuracy: Data Communication System must deliver the message accurately without any change. If incorrect data is transmitted by the system, it may not be usable.

What is Data Management and its Purpose

Managing Data and Its importance || Explained Managing Data means storing files in secondary storage devices such as USB, Hard Disk etc. in an organized way. If we will store data in our computer in an organized way it would be easier to find it easily and quickly. In Windows the Document folder is a default folder where user saves files. If we manage data it would be easy to update for us. File Management tools of Graphical User Interface (GUI) Operating System provide facilities to quickly and easily create a New folder and copy or move files into them. It allow user to delete unnecessary files and folders. Shortcut Key to Create a New Folder:   Ctrl + Shift + N

Who is Anonymous || Anonymous (The Hacktivists) || Anonymous is in Action

Who is Anonymous || Anonymous (The Hacktivists) || Explained   Anonymous is a decentralized group of Hackers without an identity. They did a first attack in 2003. It has no headquarters so there is no option to join anonymous. They use wrong way to hack but their purpose is to give peoples freedom of speech, Equality and Justice on Internet. Anonymous is basically an idea. They have done many operations and against governments of different countries. The following are some famous operations of Anonymous: ·       OP Dark net (Removed Child Pornography from Dark web) ·       OP Israel (Shutdown approximately 10000 Israeli websites) ·       OP Iran ·       OP Payback Etc. Anonymous uses guy fox masks and there is no way to join the group. Anonymous also had official YouTube Channel. This channel was given by google to Anonymous. Anonymous uploads and tells world the injustices that are being done to people. Anonymous hack for the People. Anonymous say that: WE ARE ANON

Backdoor with name Black Water has been discovered in 2020

Black Water Backdoor || Newly Discovered Malware 2020 || Explained This new backdoor malware leveraged the coronavirus outbreak to abuse Cloud flare workers as an interface to the C2 server. The malware enters into the computer through a suspicious RAR file named ‘COVID-19’ that provided the information about the disease. When victims opens it, it runs a virus in Background so it might become difficult to detect

New Ransomware with COVID-19 name started its operations in 2020

Coronavirus Ransomware || Newly found Malwares in 2020 || Explained Coronavirus Ransomware was discovered by Malware Hunter Team, This new ransomware is distributed through a fake web website pretending to promote system optimization software utilities from Wise Cleaner. After infecting a system, it encrypts the files with a specific extensions and later demands approximately 50$-100$ in bitcoins to decrypt files.

Wiper Malware Called COVID-19 for Windows

Coronavirus wiper malware || Newly Found Malware || Malware Discovered in 2020 || Explained This is a new malware that attack those systems which uses a Microsoft Windows Operating System. This new windows malware, which is no less than NotPetya, makes disks unusable by overwriting the master boot recorder (MBR). The victims of the malware are shown a gray screen and a blinking cursor with a simple message that reads, “Your Computer has been trashed”.

Blue Tea Action” , Drive the Life Trojan an email worm

Newly Found Malware || Blue Tea Action Trojan || Malware discovered in 2020 during covid-19 pandemic || Explained This new Trojan was found to be propagated through phishing e-mails that had a subject line as “The Truth of COVID-19”. This phishing E-mail included an RTF attachment carrying the exploit for CVE-2017-8570 vulnerability.

Newly found Malware|| Project Spy Campaign || Newly Discovered Malware in 2020 || Explained

Newly found Malware|| Project Spy Campaign || Newly Discovered Malware in 2020 || Explained The Project Spy campaign was launched too infect Android and iOS users with two different Spywares named:   Ø AndroidOS_ProjectSpy.HRX   Ø IOS_ProjectSpy.A. These Spyware were disguised as an app called “Coronavirus Updates” that had a significant number of download in India , Afghanistan, Iran, Bangladesh, Saudi Arabia, Austria, Romania, Grenada, Pakistan and Russia. It is a Spyware. Spyware programs are developed to spy on other user system for gathering information about their activities.

Newly Discovered Malwares || Poet RAT (Remote Access Trojan) || Malwares found in 2020 || Explained

Newly Discovered Malwares || Poet RAT (Remote Access Trojan) || Malwares found in 2020 || Explained Poet RAT (Remote Access Trojan) is a Python based remote access Trojan (RAT). Adversaries had used this to target the Government of Azerbaijan Government and Energy Sector. The malware was deployed through Microsoft Word documents that arrived through COVID-19 themed phishing E-mails. It is one of the most dangerous malware. It gives the full access of victim computer to Attacker.  

Corona Locker a newly found malware

Corona Locker || Newly found Malware || Explained It is a screen locker, which is distributed through a fake WLAN program called wifihacker.exe tries to lock users out of windows by making annoying sounds and displaying a warning message. The victim is asked to contact attackers through an e-mail address displayed on the screen to unlock the screen. Once installed, the malware creates a variety of Registry settings that prevent the Task Manager and Run Commands from working, the desktop icons are hidden, Start Menu is disabled, and more.

Newly Discovered Malwares in 2020 || Malwares that Trapped into Coronavirus fears to infect Users

Newly Discovered Malwares in 2020 || Malwares that Trapped into Coronavirus fears to infect Users In few Past weeks, Security researchers have found a variety of malwares with new capabilities that were propagated in the name of coronavirus. Some of these malware exploit the sensitivity of the current situation to create way more havoc than in normal circumstances. The following are newly discovered dangerous malwares: Ø Corona Locker Ø Poet Rat (Trojan) Ø Project Spy Campaign Ø Blue Tea Action Trojan Ø Coronavirus wiper malware Ø SpyMax Ø Coronavirus Ransomware Ø Blackwater backdoor If you want to know how they spread and infected thousands of systems you can read my blogs below                                                                       

Data Transmission modes || Explained

Data Transmission modes || Explained Data Transmission is the process of sending message from one device to another. It consist of sender, Receiver, Transmission medium. There are three modes of data transmission:      1.   Simplex      2.   Half-Duplex      3.   Full Duplex Ø Simplex Transmission Mode: In Simplex Transmission mode sender sends the message but receiver does not reply. It is only in one direction Some examples are: §   Radio and television broadcasting. Ø Half-Duplex Transmission mode: In Half-Duplex Transmission mode sender send the message but receiver does not reply at the same time. It is bidirectional process. Examples §   Computer to ATM machine. Ø Full-Duplex Transmission mode:   In Full-Duplex Transmission mode sender sends the message and Receiver reply at the same time. It is also bidirectional process. Examples §   Telephone call