Hackers are trojanizing tools of the trade to hack other hackers

Subscribers:
4,200
Published on ● Video Link: https://www.youtube.com/watch?v=7c_FEKJTrh0



Duration: 1:41
5 views
0


Reported today on TechSpot

For the full article visit: https://www.techspot.com/news/84339-hackers-trojanizing-tools-trade-hack-other-hackers.html

Hackers are trojanizing tools of the trade to hack other hackers

Who hacks the hackers?

In context: Hackers are often portrayed as elite-level computing geniuses that are somehow impervious to the types of attacks they are known for waging. The truth of the matter, however, is that like most other things in life, there are levels to the game.

Threat detection specialists at cybersecurity technology company Cybereason recently unmasked a campaign in which hackers are weaponizing various hacking tools and key generators and redistributing them on forums and websites. In this instance, they are using a powerful Trojan called njRat that has been around since at least 2013.

Once the malicious files are downloaded and opened, the attacker gains complete access to their machine and can use it for anything from conducting DDoS attacks and stealing sensitive information to recording microphone and webcam feeds.

It's rather clever when you think about it. Instead of going out and doing the dirty work themselves, attackers are letting other hackers get their hands dirty and stealing their haul without them even knowing it.

Cybereason said it appears as though the campaign has been going on for several years. Worse yet, it's not limited to hacking tools as they've also found samples pretending to be Chrome browser installers, native Windows applications and programs not related to hacking or penetration testing. New iterations are cropping up on a daily basis, the firm added.

Masthead credit: Hacker by redpixel.pl. Screenshot by Cybereason.




Other Videos By Colin Boyd SEO


2020-03-11Uber's Lost & Found Index reveals interesting items accidentally left behind by customers
2020-03-11Law enforcement in India used facial recognition to ID 1,100 rioters in New Delhi
2020-03-11Opinion: AMD highlights path to the future
2020-03-11DoNotPay's extension lets you share streaming services without revealing your password
2020-03-11Intel's 10th-gen Comet Lake desktop CPUs might not arrive until June
2020-03-11Publisher 2K Games strikes deal with NFL to make football games again
2020-03-11Don't touch your face! This vibrating wristband helps keep hands away
2020-03-11E3 2020 will be officially canceled today
2020-03-11SpaceX's 'Starlink' satellite-based internet service will be fast enough for competitive gaming
2020-03-11Nvidia CEO Jensen Huang won't deliver his annual GTC keynote this year
2020-03-11Hackers are trojanizing tools of the trade to hack other hackers
2020-03-11Doom Eternal won't run at true 4K on Stadia
2020-03-11Former Nintendo president Reggie Fils-Aimé to fill seat on GameStop board
2020-03-11Command & Conquer Remastered Collection gets June 5 launch date
2020-03-11Using four mics and a speaker, drones can echolocate like bats
2020-03-11Microsoft takes down botnet that infected nine million devices
2020-03-11Google asks its North American employees to work from home due to coronavirus concerns
2020-03-11OnePlus 8 series "all in on 5G," but prices will rise
2020-03-11Microsoft previews new lightweight File Explorer for Windows 10X
2020-03-11The average household now pays more for cable package than utility bills combined
2020-03-11Verizon attempts to capitalize on brand recognition with Yahoo Mobile phone service