Category : Business Professionals , Code , Computer Forensics , Cyber Security , Documents , Downloaad , Email , Email Address , Hack , Hackers , Hacking , Inexsmar Attack , Internet , Malicious , Malicious Code , Malicious Payload , Malicious Program , Malware , Malware Attack , Message , Payload , Phishing Attack , Phishing Email , Program , Public WiFi , Remote Access , Software , Trojan , Trojan Downloader Process , Trojan Malware , Virutal Private Network , Wi-Fi
Dear Blast Reader,
Do you stay at hotels when you travel? Do you ever use the hotel internet? Did you know that there may be someone spying on you while you are in your hotel? Did you know that hackers target hotel Wi-fi? Did you know that the hackers that target hotel wi-fi also target traveling business professionals?
Hotel wi-fi is targeted and compromised to assist in the delivering of the malicious payload to the selected victims. A payload is the part of the malware that performs the malicious action. Those behind the attack continually evolve the malware’s tactics and payload. It is believed that the attackers are exploiting the vulnerabilities in the server software, either by:
- Gaining remote access.
- Physically gaining access to the hotel and the hotel’s servers.
Now, attackers are using a new form of malware known as the “Inexsmar Attack”. This attack starts with a phishing email. To make the email look real, the message is tailored to you. This email address you by name, and has real looking documents attached.
But, looks can be deceiving. Within this email there is a self-extracting archive package. This is a package that begins the trojan downloader process. A trojan downloader process is a malicious program, usually installed through an exploit or some other deceptive means. Using email attachments the malware is installed onto your computer. Once you are convinced to open the attachment, hackers will then initiate their malware attack.
How does the malware go un-detected?
To prevent being detected, the malware is downloaded in stages. These stages include:
- Hiding malicious codes and strings by linking malicious code to otherwise unrelated code.
- The malware then runs an operation to download the second part of the payload, the trojan malware.
So, as your defences improve, it is believed that the multi-stage download for the trojan malware is an evolutionary way to keep the trojan viable.
So, how do you protect yourself?
To protect yourself against this new form of advanced and evolutionary trojan malware, here are a few tips:
- Use public wi-fi as little as possible. Hackers exploit public wi-fi in places like coffee shops, restaurants, and hotels.
- Use a Virtual Private Network, also known as a VPN. VPNs are encrypted web browsers that hide your IP addresses & your location.
If you have any questions about Hacking, Malware, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit out website at www.FDS.Global.