Hackers exploiting trust with malware triumvirate
Hackers are using three families of malware in exploiting user trust in supposedly safe websites.
Some savvy cyber criminals have used just three families of malware to infect around five million systems, in what one security firm has labelled the "trust phenomenon."
Rather than using more shady areas of the internet, such as pornography or download sites, to spread infection, the hackers tracked by avast! have sought to exploit user trust in websites believed to be secure.
Users appear to have plenty of faith in well-known web services, with one user complaining to avast!: "I very much doubt Google is sending me a Trojan."
Another said they didn't want their time wasted by alerts from avast!.
"The danger is in the familiar, everyday trusted places on the internet which are as much a part of a daily routine like your morning coffee," said Jiri Sejtko, avast! senior virus analyst.
"People send us complaints about false positive detections' and even disable their AV protection in order to reach their desired location then they wish they hadn't."
The three kinds of malware that avast! believes to be part of the "trust phenomenon" include the Ill family, Kroxxu and JS:Prontexi.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
All are technologically very different, according to avast!, but they are also highly effective in snaring unwitting users.
"Bad guys move in cycles, creating new variants with the knowledge gained from previous generations," Sejtko added.
"When you get an alert from your antivirus program, don't ignore it."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Trump's AI executive order could leave US in a 'regulatory vacuum'News Citing a "patchwork of 50 different regulatory regimes" and "ideological bias", President Trump wants rules to be set at a federal level
-
TPUs: Google's home advantageITPro Podcast How does TPU v7 stack up against Nvidia's latest chips – and can Google scale AI using only its own supply?
-
Europol hails triple takedown with Rhadamanthys, VenomRAT, and Elysium sting operationsNews The Rhadamanthys infostealer operation is one of the latest victims of Europol's Operation Endgame, with more than a thousand servers taken down
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up stingNews Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
-
Horabot campaign targeted businesses for more than two years before finally being discoveredNews The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
-
Brand-new Emotet campaign socially engineers its way from detectionNews This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomwareNews The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
-
Beating the bad bots: Six ways to identify and block spam trafficIn-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against RussiaNews The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
-
Microsoft's secure VBA macro rules already being bypassed by hackersNews Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
