spyware Archives | Vednam https://vednam.com/tag/spyware/ Latest News on Cyber Security,Hacking and Tech Wed, 24 Jun 2020 14:14:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://vednam.com/wp-content/uploads/2020/05/cropped-LOGO-PNG-02-1-32x32.png spyware Archives | Vednam https://vednam.com/tag/spyware/ 32 32 32 million Chrome Browser user Potentially Impacted by spying Campaign https://vednam.com/32-million-chrome-browser-user-potentially-impacted-by-spying-campaign/ https://vednam.com/32-million-chrome-browser-user-potentially-impacted-by-spying-campaign/#comments Mon, 22 Jun 2020 11:09:16 +0000 https://vednam.com/?p=961 Find another malicious attack for the Chrome users and the massive spying Campaign is launched or executed with the help of Chrome browser extensions and aimed to be streal sensitive data of users. A researcher from the awake security has uncovered more than 111 malicious chrome extensions that are using GalComm Domains from the command […]

The post 32 million Chrome Browser user Potentially Impacted by spying Campaign appeared first on Vednam.

]]>
Find another malicious attack for the Chrome users and the massive spying Campaign is launched or executed with the help of Chrome browser extensions and aimed to be streal sensitive data of users.

A researcher from the awake security has uncovered more than 111 malicious chrome extensions that are using GalComm Domains from the command and control the operation.

The CommuniGal communication Ltd.(GalComm) is an Israel based internet domain register which was founded in 2000.

Extensions and Domains

From Awake security, they observed that almost 60% of the domains registered by the GalComm are found malicious. When they are used for serving malware or involved in surveillance activities.

The domains were used by the various evasion techniques that stay undetected by the most security solutions.

You see the complete list of the domains: Link

About 111 malicious extensions use GalComm domains for the C&C and they are aiming to take screenshots that read the clipboard and harvest credentials tokens which are stored in cookies or parameters and grab the user keystrokes and monitor other activities.

The extensions are downloaded for more than 32,962,951 times from the chrome web store which is the extensions alone download 10 million times.

“Based on the number of the downloads it was far-reaching a malicious chrome store to date “ as the co-founder of awake mentioned.

"32

The malicious extensions are posed to offer file conversion and other utility servers but their goal is to user data

Most of the surveillance  campaign specifically targets users “Financial services, gas and oil, media and entertainment, healthcare and pharmaceuticals, retails high tech, higher education and government organizations.”

Google does not share any details about how the spyware apps are unfiltered with the play store.

The Domain registrar company Galcomm told that “His company had done nothing wrong and the company is not involved  and not in complicity with any malicious activity whatsoever”

These types of campaigns are serious these days and they are really doing the best job to spy your browsing history.

Found this article informative? Follow Vednam on Facebook, Twitter, Mix, Tumbler, and Linkedin to know more exclusive content we post.

The post 32 million Chrome Browser user Potentially Impacted by spying Campaign appeared first on Vednam.

]]>
https://vednam.com/32-million-chrome-browser-user-potentially-impacted-by-spying-campaign/feed/ 1
What is Malware ? What are the Types ? https://vednam.com/malware-families/ https://vednam.com/malware-families/#comments Thu, 21 May 2020 08:08:23 +0000 https://vednam.com/?p=224 When we talk about malware, it directly points to the number of malicious software variants, ransomware, malware, and spyware. It typically consists of code developed by attackers or you say cyberspy people who cause extensive damage to data and systems or to get access to your systems without any authentication on the network. Malware is […]

The post What is Malware ? What are the Types ? appeared first on Vednam.

]]>
When we talk about malware, it directly points to the number of malicious software variants, ransomware, malware, and spyware. It typically consists of code developed by attackers or you say cyberspy people who cause extensive damage to data and systems or to get access to your systems without any authentication on the network.

Malware is transferred or delivered in the form of a link or file over email and requires the user to click on the link to open or execute it.
Malware has actually been a threat to a specific user or organization It started in the early 1970s when the creeper virus came into the market.

According to the Technology company Intel, the world has been under attack from thousands of different and functioning its variants, all it causes the most disruption and damage as possible.

Let’s Talk Malware Do :

It Delivers payload in different ways It depends on the attackers who want to steal sensitive data and ask for Ransom to give it back. The Cyber attackers know what to steal if the malware is working on your system and its effects through the network.

Malware Types:

VIRUS: The most common word used or all malware. It all works as a biological Virus where the virus needs to get intact with your system and spread in between the code to get all access to your systems. It corrupts your files and affects the core functionality of systems and also locks the user computers. The virus always carries executable files.

WORMS: Worms work the way it gets named by the attackers. When a system in your network gets infected by Worm, then it uses your network to infect the other machines in order to continue the spread of infections. The process of spreading is faster from others if the entire machines are on the same network.

SPYWARE: Spyware name says it all that this member of malware is meant to spy on your machines and it hides the background of your system and collects all your activities performed on your machine. This spyware collects your credit card details, password, and other sensitive data.

TROJANS: You heard the story of Greek Soldiers hiding in a giant horse and attacking enemies. It uses the same method with machines. It hides with legitimate software. It will attack the system security by creating a backdoor that gives other malware variants easy access.

RANSOMWARE: Another name is called scareware, this scares people a lot in the year 2017. This Malware locks your system and start time and asks to pay Ransom in the form of bitcoin. It happens with lots of big organizations -the result was worse and expensive.

 

report-Microsoft

How Does Malware Spread in Your Machines? 

Every malware doesn’t work the same and they all have their own unique way of causing havoc and relying on user action. Some attackers use Emails and links to transfer it and execute them in your machine. Even these days mobile phones are vulnerable to attack. The organization Mainly takes all effective methods to lay down the attack of malware.

How Do You Protect your machines From Malware attacks?

There are two methods you can get aware of the malware : 
First, is often the easiest way to implement the malware protection tools to manage the attacks on your machines. The other way is to stop visiting the website which is having no secured link. Check email and other links you got from mail and other stuff. Verify every step you take to not cause root problems related to it.

Found this article informative? Follow Vednam on Facebook, Twitter, Mix, Tumbler, and Linkedin to know more exclusive content we post.

The post What is Malware ? What are the Types ? appeared first on Vednam.

]]>
https://vednam.com/malware-families/feed/ 3