{"id":352,"date":"2017-11-06T12:10:07","date_gmt":"2017-11-06T12:10:07","guid":{"rendered":"https:\/\/tftus.blog\/?p=352"},"modified":"2025-12-16T07:56:48","modified_gmt":"2025-12-16T07:56:48","slug":"recent-malware-attacks","status":"publish","type":"post","link":"https:\/\/stg.tftus.com\/blogs\/recent-malware-attacks\/","title":{"rendered":"Recent Malware Attacks: It&#8217;s Effect and Prevention"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Recent Malware Attacks and Security Breaches have become a major security concern for business all around the world. We have compiled a list of recent malware attacks, their effects, and their prevention. Read on to know how you can prevent yourself from such malware and if affected what should be some damage control practices.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Your Browser Could Be Mining Cryptocurrency For Strangers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Cryptojacking secretly uses your laptop or mobile device to mine cryptocurrency when you visit an infected site. It has exploded in popularity over the past few weeks. Hackers use Javascript which starts working instantly when you load a compromised web page and start mining. There&#8217;s no immediate way to tell that the page has a hidden mining component, and you may not even notice any impact on performance, but someone has hijacked your devices\u2014and electric bill\u2014for digital profit.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How To Protect:<\/span><\/h4>\n<ul>\n<li><span style=\"font-weight: 400;\">You can add sites you&#8217;re worried about, or ones that you know practice in-browser mining, to your browser&#8217;s ad blocking tool.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">There&#8217;s also a Chrome extension called<\/span><span style=\"font-weight: 400;\"> No Coin<\/span><span style=\"font-weight: 400;\">, that blocks Coinhive mining and is adding protection against other miners, too.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">2. Your wi-fi enabled gadgets just got more Scary!<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The KRACK vulnerability allows malicious actors to access a WiFi network without the password or key. They can steal information like credit card numbers, passwords, and any emails that are transmitted over WiFi networks, modify the traffic amongst network, infect your device with an unknown malware, they can do all this without even being in the network. Everyone and anything using WiFi is at risk.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How to protect your devices from KRACK:<\/span><\/h4>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Install the automatic updates available on the device.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t rush to change the password just yet. If there are security updates available on the router, now is the time to update the device.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">You can find a running list of companies that have provided patches<\/span><span style=\"font-weight: 400;\"> here<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">3. Reaper IoT Botnet<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The latest botnet threat IoT Troop\/Reaper has already affected a million networks and counting. \u00a0It uses known security flaws in the codes of machines like checking for open doors, using hacking techniques with the help of compromising tools to break into the system and then spread itself further<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This attack has compromised IoT security by affecting routers from D-Link, Netgear, and Linksys, as well as Internet-connected surveillance cameras, including those sold by companies like Vacron, GoAhead, and AVTech.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How to Protect:<\/span><\/h4>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"font-weight: 400;\">Everyone using wi-fi enabled gadgets should check the company\u2019s<\/span><a href=\"https:\/\/research.checkpoint.com\/new-iot-botnet-storm-coming\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\"> list of affected gadgets<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Analysing IP traffic from devices can reveal if they\u2019re communicating with the command-and-control server helmed by the unknown hacker that&#8217;s administering the botnet.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Install latest updates and patches in your devices, home network router, and surveillance camera systems.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">You can perform a factory reset on devices, which might wipe the malware.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">4. Supply chain security problem in Softwares<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hackers have been targeting attacks in the software supply chain by sneaking malware into downloads from vendors even trusted ones. Hence the malware is installed long once you click the install button. Hackers sabotaged the popular, free computer-cleanup tool CCleaner in the last month, by inserting a backdoor into updates to the application that landed in millions of personal computers. \u00a0Three times in the last three months, hackers have exploited the digital supply chain to plant tainted code that hides in software companies&#8217; own systems of installation and updates, hijacking those trusted channels to spread their malicious code. \u00a0<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">How To Protect:<\/span><\/h4>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Investigate the internal security practices of the companies whose software you use<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Read up on different applications to determine if they&#8217;re created with security practices that would prevent them from being corrupted.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Look for alternatives with better security protections<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/stg.tftus.com\/blogs\/\">We help our clients <\/a>with intelligent technical solutions and innovation. With recent malware attacks happening, we are offering a <a href=\"https:\/\/stg.tftus.com\/blogs\/security-testing\">Free Security Audit<\/a>.\u00a0 <a href=\"https:\/\/stg.tftus.com\/blogs\/blog\/\">Read more<\/a> on latest tech news, new solutions, and innovations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\t\t\t\tRecent Malware attacks in the year 2017 have become a big security concern. Here is a list of recent malware, strategies to prevent them, and minimise risks\t\t<\/p>\n","protected":false},"author":2,"featured_media":3026,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[206,320],"class_list":["post-352","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-malware","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts\/352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":1,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts\/352\/revisions"}],"predecessor-version":[{"id":12474,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/posts\/352\/revisions\/12474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/media\/3026"}],"wp:attachment":[{"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/media?parent=352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/categories?post=352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stg.tftus.com\/blogs\/wp-json\/wp\/v2\/tags?post=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}