Plugavel.
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us
No Result
View All Result
Plugavel.
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us
No Result
View All Result
Plugavel.
No Result
View All Result
ADVERTISEMENT

Beware of this malware that traps antivirus!

12 de January de 2022
in Tech
Le malware SysJoker se fait passer pour une mise à jour système. © Intezer
ADVERTISEMENT

Researchers have discovered a new type of computer malware that attacks all three major operating systems. By pretending to be a system update, it manages to avoid detection.

You will also be interested


[EN VIDÉO] Ransomware: how does it work and how to prevent it?
Ransomware or ransomware is malicious program that prevents the victim from accessing the contents of their files in order to extort money from them.

New malware has been discovered that attacks Windows, macOS, and Linux as well. The intruder was spotted in December on a web server Linux of an educational institution by cybersecurity researchers to enter. They named it SysJoker for its ability to masquerade as a system update in order to avoid detection.

Researchers submitted a sample of the malware to the VirusTotal site, which allows files to be scanned by more than 70 antivirus software. None succeeded in detecting the Linux and macOS versions. For the Windows version, only six antiviruses reported a problem.

Towards a ransom demand?

On Windows, SysJoker uses an “injector” (or dropper) in the form of a DLL library in order to enter the system. It is this one which will then install the malware strictly speaking. Once in place, it launches commands in Windows PowerShell to download the compressed (ZIP) folder containing the program, unzip it, and run it. Once started, SysJoker pauses for a random duration of 90 to 120 seconds. Then it creates the folder C:ProgramDataSystemData and registers there under the name igfxCUIService.exe in order to impersonate the Intel graphics driver.

ADVERTISEMENT

The program then connects to a Google Drive link to download a text file containing the address of the order servers and Control (C&C), which will send it instructions to install other malware or execute commands. According to the researchers, this file has been updated several times since they monitored it, showing that its author is still active. From his behavior, it appears that the malware targets specific targets. The researchers believe that its purpose is first to spy on its victims, and that the next step could be an attack of the type ransomware.

Interested in what you just read?

.

Tags: antivirusBewarecybersecuritylinuxMacmalwareransomwarespywaretrapsWindows
ShareTweetPin

Related Posts

À distance, on déverrouille le robot Uber Eats pour récupérer ses courses ou ses plats. © Serve Robotics
Tech

Uber Eats robots begin deliveries

World leader in the delivery of meals and groceries at home, Uber Eats, offers three new features: ordering drinks or...

17 de May de 2022
Udemy vous propose une formation pour découvrir et maîtriser le langage de programmation R © MonsItJ, Adobe Stock
Tech

R language: take advantage of R programming training at -89%

Passionate about Data Science, do you want to orient yourself in this branch? Udemy offers you a very complete training...

17 de May de 2022
Bon plan : la montre connectée Apple Watch Series 7 © Amazon
Tech

Apple Watch Series 7: a promo on Amazon not to be missed!

Want an Apple smartwatch on your wrist? Connected watches are very practical to use on a daily basis, follow your...

17 de May de 2022
Il ne s’agit pas d’un railgun, mais d’un coilgun, autrement dit un fusil magnétique. © Arcflash Labs
Tech

The US Army is interested in the electromagnetic rifle

You will also be interested This drone flies without battery thanks to electromagnetic induction A researcher from Imperial College London...

17 de May de 2022
Next Post
Wanting to overtake no matter what, these motorists took a return of karma

Wanting to overtake no matter what, these motorists took a return of karma

Mining bitcoin with your Tesla?  It's possible according to this entrepreneur

Mining bitcoin with your Tesla? It's possible according to this entrepreneur

Recommended

Alpine retains drivers for 2022 WEC season

22 de February de 2022

With all these police cars chasing them, the fugitive manages to get away!

24 de February de 2022
Mercedes C-Class 2021 test: our opinion behind the wheel of the German sedan

Mercedes C-Class 2021 test: our opinion behind the wheel of the German sedan

25 de June de 2021
Data Sciences © pdusit, Adobe Stock

Good training plan: take advantage of 89% reduction on Data Science training

6 de January de 2022
ADVERTISEMENT

Categories

  • Car
  • Carros
  • Tech
  • Tecnologia
ADVERTISEMENT
  • Home
  • Privacy policy
  • About us
  • Contact us
© 2021 Plugavel - News about technology and cars on one site Plugavel.
No Result
View All Result
  • Home
  • Tech
  • Car
  • More
    • Privacy policy
    • About us
    • Contact us