29 Sept 2011 ~ PCCare247.com PCCare247.com Blog, PC Care 247 Tech Support Redefined

Thursday 29 September 2011

Malware is out there to get you

Malware, Viruses, Trojans as a dreaded trifecta have made the internet an easy and plum target for cyber criminals. And with malware scoring heavily over the other two, organizations are in dire need to take drastic measures for safeguarding their crucial data. For the failure to do so may bring all doomsday theories to life; while at the same time leaving one groping for answers as to what really devoured their data with such nonchalant ease.

The Weapons Creators
·         Zero-day exploit finders  - Wade though software, digging up undocumented  bugs and vulnerabilities

·         Toolkit Authors  - Purchase exploits and build malware using them, before licensing o selling it out to attackers
PCCare247 Malware Support

The Launderers
·         Mules - Figure out ways to transfer or move stolen money to the hands of criminals running malware networks, for a percentage fee.
·         Exchangers - Acquire large amounts of virtual currencies to split and sell in smaller, untraceable quantities.

·         Virtual currency sellers - Sell stolen virtual currencies.

The Attackers
·         Financial data stealers - Either sell your credit card and bank information by the hundreds to other criminals, or use them to make fraudulent transactions on your behalf.

·         Identity Stealers - Steal and user identities, including financial and personal.

·         PPC generators - use infected computers to deliver millions of fake ad clicks on web sites, earning money from ad providers like Google in the process.

The Delivery Amplifiers
·         Botnet herders - A key component of the malware supply chain, herders infect and turn tens of thousands of computers around the world into “zombies”. Controlling them to do anything such as spreading viruses, producing internet traffic or attacking websites.

·         Spammers - Infect millions of unsuspecting users by sending them infected attachments or guide them to infected websites.

·         Phishers - Create fake Web sites for tricking users into revealing their personal information.

·         Black hat SEO - Use illegal techniques to boost search engine rankings of malware removal-hosting Web sites, usually by commandeering botnets

    PCCare247.com Copyright © 2012-2013 by PCCare247 Solutions (P) Ltd.