Your IT Support Experts

We partner with many types of businesses in the area, and strive to eliminate IT issues before they cause expensive downtime, so you can continue to drive your business forward. Our dedicated staff loves seeing our clients succeed. Your success is our success, and as you grow, we grow.

Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

(703) 621-3900

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

Ciracom Blog

This Botnet Proves That There’s No Honor Among Thieves

This Botnet Proves That There’s No Honor Among Thieves

Cybercriminals and hackers aren’t exactly examples of the most trustworthy people online, so it should come as no surprise that they are willing to exploit each other for their own benefit. We recently saw an example of this phenomenon with the Cobain botnet.

Hackers have begun to see the value of creating a highly-demanded product, and now create malware that is available to be leased to aspiring amateur cybercriminals. These amateurs only need to fork over a fee in Bitcoin for access to the latest programs designed by more experienced hackers--but it isn’t always that simple, as the recent botnet program Cobian shows.

Powered by njRAT, a malware that first appeared in 2015, Cobian gives its user access to a considerably threatening set of tools--including webcam control, screensharing, a keylogger, and remote code execution. However, Cobian also includes some features that these users would be less than enthusiastic about. While creating the program, the developers included some encrypted code that provides them with access to the botnet’s master control switch.

As a result, those who purchase the Cobian botnet are unwittingly handing over their systems to the developers to do with as they wish. It would be funny, if it didn’t still mean that the average user is at risk.

NakedSecurity explains how the botnet remains hidden, going on to describe how the threat ultimately activates:

“Cobian’s executable payload disguises itself as a Microsoft Excel file. Cobian’s secondary payload then checks to see if the second-level operator is online. If so, then the code that enables the author to acquire master control operates to evade detection. If the second-level operator is offline, the secondary payload acquires the address of the author’s command and control servers from Pastebin.”

As if we needed another reminder, Cobian proves that hackers simply cannot be trusted--but it also proves that the threat of a hacking attack is more pronounced than many business owners may be prepared for. If a botnet, or other threat, can be leveraged by those without technical skill, the odds of an attack are much greater. As a result, it becomes that much more important to ensure your business is protected. For help, call Ciracom at (703) 621-3900.

Why Is Remote Monitoring and Management A Good Cho...
Tip of the Week: Cleaning Your Computer Is a Delic...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, May 08, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://ciracom.com/

Customer Login

Contact Us

Learn more about what Ciracom can do for your business.

(703) 621-3900

Ciracom
761-C Monroe Street Ste 200
Herndon, Virginia 20170