<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malicious program Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/tag/malicious-program/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/tag/malicious-program/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Tue, 17 Dec 2024 01:48:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>malicious program Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/tag/malicious-program/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>What Do the Ransomware Names Mean?</title>
		<link>https://www.trickyenough.com/what-do-the-ransomware-names-mean/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-do-the-ransomware-names-mean</link>
					<comments>https://www.trickyenough.com/what-do-the-ransomware-names-mean/#respond</comments>
		
		<dc:creator><![CDATA[Robin Khokhar]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 07:46:12 +0000</pubDate>
				<category><![CDATA[Data]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[malicious program]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware threats]]></category>
		<category><![CDATA[ransomeware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Ransomware Names]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Measures]]></category>
		<guid isPermaLink="false">https://www.trickyenough.com/?p=45992</guid>

					<description><![CDATA[<p>Ransomware is a particularly insidious category of malware that can lock computers, encrypt files, or both, and hold them for ransom. Many different ransomware strains can vary in their functionality and infection capabilities. And as you may have noticed, some ransomware strains also have colourful names. What do the ransomware names mean, and what makes...</p>
<p>The post <a href="https://www.trickyenough.com/what-do-the-ransomware-names-mean/">What Do the Ransomware Names Mean?</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>Ransomware is a particularly insidious category of malware that can lock computers, encrypt files, or both, and hold them for ransom. Many <a href="https://www.trickyenough.com/a-comprehensive-guide-to-ransomware-backup-protection/" target="_blank" rel="noreferrer noopener">different ransomware strains</a> can vary in their functionality and infection capabilities. And as you may have noticed, some ransomware strains also have colourful names. What do the ransomware names mean, and what makes one ransomware different from the next?</p>



<h2 class="wp-block-heading" id="h-ryuk">Ryuk </h2>



<p>Ryuk is a <em>Shinigami</em> or God of death in the Japanese animated series <em>Death Note</em>. The show&#8217;s protagonist discovers the character and attempts to use him for good deeds while fulfilling Ryuk&#8217;s hunger for amusement. Fans have drawn entertainment both from Ryuk and the show&#8217;s dark humour. </p>



<p>Unfortunately, there&#8217;s nothing humorous about Ryuk ransomware, which researchers found in 2017. What makes <a href="https://www.malwarebytes.com/ryuk-ransomware" target="_blank" rel="nofollow noopener">Ryuk ransomware</a> more threatening than other strains is its ability to isolate network drives and resources and delete and disable restoration tools and backup systems. It can also spread more easily with its new worm-like capabilities. </p>



<p>Extortionists typically use Ryuk for targeted attacks. The malware has infected businesses, media websites, and even hospitals. Researchers estimate that the malware raised over $61 million between February 2018 and October 2019 alone. </p>



<h2 class="wp-block-heading" id="h-petya">Petya </h2>



<p>Petya is another ransomware strain with a name drawn from popular culture. In the 1995 James Bond film <em>GoldenEye</em>, Petya was a Soviet weapon satellite carrying a weapon of mass destruction. The Petya ransomware was similarly destructive and innovative, though it wasn&#8217;t unusually infectious. </p>



<p>The first Petya ransomware strain was unique because it blocked victims from accessing their computers rather than encrypting files. The malware spread through phishing emails that carried job offers. But for Petya to unleash havoc, users had to agree to grant it administrative control, which many experienced users recognized as a red flag.  </p>



<p>Later versions of Petya were more infectious and even more dangerous. One, in particular, NotPetya, may still give many computer users nightmares.</p>



<h2 class="wp-block-heading" id="h-notpetya">NotPetya</h2>



<p>In 2017, a variant of Petya started infecting computers that were so different that researchers dubbed it &#8216;NotPetya&#8217; to help people understand it was new ransomware. NotPetya was part of a cyberattack in Europe, primarily targeting companies in Ukraine. Later, NotPetya spread to Germany, Italy, France, Poland, the United Kingdom, and the United States. Unlike Petya, NotPetya did not seek administrative permissions. It also used a Windows <a href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831795(v=ws.11)" target="_blank" rel="nofollow noopener">Server Message Block (SMB)</a> protocol exploit called EternalBlue. While many researchers believe that the ransomware started from Russia as a political attack, its exploit may have been stolen from the U.S. National Security Agency (NSA). </p>



<h2 class="wp-block-heading" id="h-wannacry">WannaCry</h2>



<p>WannaCry got its name from strings of codes found in initial samples of the malware, but the name was apt because it made a lot of organizations want to shed tears of grief. The crypto-ransomware exploited an SMB vulnerability to infect countless hospitals, banks, and other companies globally, costing billions. Investigators later found that elements in North Korea were responsible for the malware. These are four pieces of ransomware with interesting names. To <a href="https://www.zdnet.com/article/ransomware-in-2022-were-all-screwed/" target="_blank" rel="nofollow noopener">protect your data</a> from any of them, use the most secure version of your operating system and invest in anti-malware technology with ransomware rollback capabilities.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/10-ways-protect-ransomware/" target="_blank" rel="noreferrer noopener">10 Ways to Protect Yourself from Ransomware</a>.</p>



<p><a href="https://www.trickyenough.com/security-good-antivirus/" target="_blank" rel="noreferrer noopener">What Security features must have in Good Antivirus</a>?</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/what-do-the-ransomware-names-mean/">What Do the Ransomware Names Mean?</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/what-do-the-ransomware-names-mean/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">45992</post-id>	</item>
		<item>
		<title>Azorult, Dark Pulsar, Oceansalt, Oh My! New Malware to Watch out for</title>
		<link>https://www.trickyenough.com/azorult-dark-pulsar-oceansalt-malware-watch/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=azorult-dark-pulsar-oceansalt-malware-watch</link>
					<comments>https://www.trickyenough.com/azorult-dark-pulsar-oceansalt-malware-watch/#comments</comments>
		
		<dc:creator><![CDATA[Robin Khokhar]]></dc:creator>
		<pubDate>Sat, 27 Oct 2018 10:41:59 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Azorult]]></category>
		<category><![CDATA[Dark Pulsar]]></category>
		<category><![CDATA[malicious program]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[New Malware]]></category>
		<category><![CDATA[Oceansalt]]></category>
		<guid isPermaLink="false">https://www.trickyenough.com/?p=7832</guid>

					<description><![CDATA[<p>Some days, it seems like the web is a magical place, where you can find any information you need, buy any products you can imagine, reconnect with old friends and make new ones based on passions and interests. Then, other days you encounter malware, and the internet transforms into a dark, dreary and dangerous place....</p>
<p>The post <a href="https://www.trickyenough.com/azorult-dark-pulsar-oceansalt-malware-watch/">Azorult, Dark Pulsar, Oceansalt, Oh My! New Malware to Watch out for</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Some days, it seems like the web is a magical place, where you can find any information you need, buy any products you can imagine, reconnect with old friends and make new ones based on passions and interests. Then, other days you encounter malware, and the internet transforms into a dark, dreary and dangerous place.</p>
<p>Indeed, the war against malware is anything but won; <a href="https://www.gdatasoftware.com/blog/2017/04/29666-malware-trends-2017" target="_blank" rel="noopener nofollow">according to one study</a>, a new variant of malware emerges every 4.6 seconds, meaning you still need the <a href="https://shop.trendmicro.com/Official-Site/">best internet protection on all your devices</a> if you want your data to stay safe. Considering the hordes of cybercriminals developing malicious software, it should hardly be surprising that you aren’t up-to-date on the latest and worst malware. Today, we’ll help you with that by explaining three big bugs lurking online.</p>
<h2 class="western">Azorult</h2>
<p>Admittedly, Azorult has been lurking online since 2016, but within the past few months, the virus has gotten a serious upgrade, making it more dangerous than ever. Sometimes written as AZORult, this Trojan finds its way onto victim devices like other Trojans do: By looking like an innocuous program. However, once installed, Azorult begins combing the device for valuable information its executors can use or sell.</p>
<p>Initially, Azorult seems to have been written for the express purpose of finding and taking payment card information as well as passwords saved in browsers, cookies, message and email history and files saved to the Desktop. However, <a href="https://www.zdnet.com/article/password-and-credit-card-stealing-azorult-malware-adds-new-tricks/" target="_blank" rel="noopener nofollow">this year its uses have expanded</a> even beyond these. In July 2018, a new variant was found for sale, advertising abilities like stealing browser history and theft of cryptocurrency wallets, which is particularly alarming to those users who bought into the Bitcoin boom earlier this year. Worse, Azorult has improved its encryption abilities, making it more difficult for authorities to identify perpetrators, and the <strong>malware</strong> can also use system proxies to hide from law enforcement.</p>
<p><strong>Suggested:</strong></p>
<p><a href="https://www.trickyenough.com/cybersecurity-vpn-money-online/" target="_blank" rel="noopener">VPN, cybersecurity and saving money online</a>.</p>
<p>Though Azorult can do much when it is installed on your devices, it isn’t any craftier than most malware at tricking you into downloading and executing the program. Thus, by being careful of where and what you download — and by installing a thorough antivirus scanner — you should be able to stay safe from this threat.</p>
<h2 class="western">DarkPulsar</h2>
<p>DarkPulsar is more often called an “<strong>implant</strong>” because it doesn’t represent the entirety of a piece of malware; rather, it is a module within a larger <strong>malicious program</strong> that improves hackers’ ability to execute and control the virus. Specifically, DarkPulsar is an administrative interface code used by malware designed to build backdoors into devices. Even when most of the malware is removed, DarkPulsar often remains behind, giving hackers continued access to victimized devices.</p>
<p>What makes DarkPulsar particularly nefarious is that it was likely developed the U.S. National Security Agency (NSA). In spring of 2017, a hacking organization called the Shadow Brokers published <a href="https://www.wired.co.uk/article/what-is-eternal-blue-exploit-vulnerability-patch" target="_blank" rel="noopener">malicious code developed by the NSA</a>, including EternalBlue which powered three of last year’s most devastating ransomware outbreaks: WannaCry, NotPetya and Bad Rabbit. Already, DarkPulsar has been used in malware that has found its way into dozens of devices, and a larger eruption could be imminent.</p>
<p>Currently, all attacks using DarkPulsar have been overseas and on devices using outdated operating systems. Still, should hackers using DarkPulsar turn their sights to American devices, you can again stay safe by maintaining high cyber hygiene and running your antivirus scan often.</p>
<h2 class="western">Oceansalt</h2>
<p><img fetchpriority="high" decoding="async" class="alignleft wp-image-7834 size-medium" src="https://www.trickyenough.com/wp-content/uploads/2018/10/tgvde-300x200.jpg" alt="Oceansalt" width="300" height="200" srcset="https://www.trickyenough.com/wp-content/uploads/2018/10/tgvde-300x200.jpg 300w, https://www.trickyenough.com/wp-content/uploads/2018/10/tgvde.jpg 710w" sizes="(max-width: 300px) 100vw, 300px" />In 2013, a Chinese hacking group gained immediate notoriety for its successful infiltration of more than 100 U.S. companies, resulting in the extraction of hundreds of terabytes of data before the group seemingly vanished into thin air. That group was known as APT1 — and their legacy lives on today in the form of a pernicious malware.</p>
<p>Specifically, a type of malware developed and used by APT1 much earlier, in 2010, is seeing new life around the web. This is surprising to most infosec professionals — not because the practice of reusing malware is uncommon (the repurposing of NSA-developed malware shows that hackers love lifting others’ code for their own designs) but rather because APT1’s malware was never released to the public, and it was never available o the black market. Though it can’t be said for certain, this strongly indicates that APT1, or rogue members of the hacking group, are once again active.</p>
<p>The remixed malware, which has been dubbed Oceansalt, has been used in spearphishing attacks. This means that unlike most malware, which floats around the internet waiting to attack anyone who downloads the infected program, Oceansalt was built and executed with specific targets in mind. The malware functions as a reconnaissance tool, sending information about activities back to hacking HQ. For now, it seems unlikely that you will become a victim of Oceansalt, but you might want to monitor the evolution of APT1’s code, which could be used in future malware attacks.</p>
<p><strong>Suggested:</strong></p>
<p><a href="https://www.trickyenough.com/mobile-app-security/" target="_blank" rel="noopener">Huge risks to mobile App security</a>.</p>
<p class="display-4 article-headline mb-3"><a href="https://www.trickyenough.com/how-to-delete-downloads-from-your-computers-and-pc/" target="_blank" rel="noopener">How To Delete Downloads From Your Computers And PC</a>?</p>
<p>Just when you think you are up-to-date on the latest and scariest malware, more malicious programs emerge. Hopefully, you come away from this article knowing more about the current threat landscape and equipped with new tools and tricks for staying safe online.</p>
<p>The post <a href="https://www.trickyenough.com/azorult-dark-pulsar-oceansalt-malware-watch/">Azorult, Dark Pulsar, Oceansalt, Oh My! New Malware to Watch out for</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/azorult-dark-pulsar-oceansalt-malware-watch/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7832</post-id>	</item>
	</channel>
</rss>
