Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Guides - Privacy & Security Tips
Anti-Virus & Malware = Myths and Facts
Message
<blockquote data-quote="Deleted member 65228" data-source="post: 684388"><p>Normal average users are a very big target aside from businesses. There are thousands, and thousands more of script kiddies who want to cause damage through the use of malicious software/web-based attacks for the sake of it or as an attempt to make money; their practice is on average home users. You don't have to be working for the NSA or CIA to be a target; normal home users aren't usually "picked", but just end up getting infected through general malicious spam e-mails, malicious links they find through being click-happy, use of of shady download sites... And so on.</p><p></p><p>Even the well-trained and experienced malware authors will happily target home users sometimes. Threats like Zeus, Carberp, Kronos, WannaCry, BadRabbit, Petya, NotPetya, and many others were not only aimed at businesses. The likelihood is that in scenarios like Zeus, the source code is sold to many others who will then pursue usage of it (targeting home users, businesses, or both simultaneously).</p><p></p><p>When it comes down to a malware author trying to make money, ideally they will want to aim for a business. However, the intention is not always specifically to make money.</p><p></p><p>About crypto-currency mining and other alike, there has been an outbreak of web-based miners, which is easier for an attacker to deploy and have it remain active for a long amount of time. <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite113" alt=":confused:" title="Confused :confused:" loading="lazy" data-shortname=":confused:" /></p><p></p><p>Phishing is quite popular as well. Not so much on the software side through fake PayPal "money givers" and similar, but web-based.</p><p></p><p></p><p>You definitely have a point in my eyes my friend! Zombie systems are those infected with a botnet, which can be a really serious problem sometimes. Botnets infections are typically used by the attacker to attack services through DDoS attacks (using up the network resources of the infected system to target a service resulting in the services' network resources being used up -> now the service is unavailable and goes down, and becomes more vulnerable to other types of attack).</p><p></p><p>There was recently security news about a new botnet found by a vendor (maybe Qihoo) which has already infected roughly over 2 million systems. You can find more information here:</p><p><a href="https://www.wired.com/story/reaper-iot-botnet-infected-million-networks/" target="_blank">The Reaper Botnet Has Already Infected a Million Networks</a></p><p><a href="http://www.healthcareitnews.com/news/massive-botnet-quietly-harvesting-2-million-vulnerable-iot-devices-report-says" target="_blank">Massive botnet quietly harvesting 2 million vulnerable IoT devices, report says</a></p><p></p><p>It seems to be some sort of "successor" to the Mirai botnet, which caused a lot of stress back in 2016. <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite111" alt=":(" title="Frown :(" loading="lazy" data-shortname=":(" /></p></blockquote><p></p>
[QUOTE="Deleted member 65228, post: 684388"] Normal average users are a very big target aside from businesses. There are thousands, and thousands more of script kiddies who want to cause damage through the use of malicious software/web-based attacks for the sake of it or as an attempt to make money; their practice is on average home users. You don't have to be working for the NSA or CIA to be a target; normal home users aren't usually "picked", but just end up getting infected through general malicious spam e-mails, malicious links they find through being click-happy, use of of shady download sites... And so on. Even the well-trained and experienced malware authors will happily target home users sometimes. Threats like Zeus, Carberp, Kronos, WannaCry, BadRabbit, Petya, NotPetya, and many others were not only aimed at businesses. The likelihood is that in scenarios like Zeus, the source code is sold to many others who will then pursue usage of it (targeting home users, businesses, or both simultaneously). When it comes down to a malware author trying to make money, ideally they will want to aim for a business. However, the intention is not always specifically to make money. About crypto-currency mining and other alike, there has been an outbreak of web-based miners, which is easier for an attacker to deploy and have it remain active for a long amount of time. :confused: Phishing is quite popular as well. Not so much on the software side through fake PayPal "money givers" and similar, but web-based. You definitely have a point in my eyes my friend! Zombie systems are those infected with a botnet, which can be a really serious problem sometimes. Botnets infections are typically used by the attacker to attack services through DDoS attacks (using up the network resources of the infected system to target a service resulting in the services' network resources being used up -> now the service is unavailable and goes down, and becomes more vulnerable to other types of attack). There was recently security news about a new botnet found by a vendor (maybe Qihoo) which has already infected roughly over 2 million systems. You can find more information here: [URL='https://www.wired.com/story/reaper-iot-botnet-infected-million-networks/']The Reaper Botnet Has Already Infected a Million Networks[/URL] [URL='http://www.healthcareitnews.com/news/massive-botnet-quietly-harvesting-2-million-vulnerable-iot-devices-report-says']Massive botnet quietly harvesting 2 million vulnerable IoT devices, report says[/URL] It seems to be some sort of "successor" to the Mirai botnet, which caused a lot of stress back in 2016. :( [/QUOTE]
Insert quotes…
Verification
Post reply
Top