Get yourself introduced with the world’s yet most advance and
sophisticated malware that has been discovered by Kaspersky and It has infected many systems in more than
31 countries . Instead of attacking the
common users or consumers, it targets the government institutions , oil and gas
companies , embassies and research companies and because of this behavior sometimes
it is assumed as a sponsored attack or campaign to run a new form of surveillance
or to collect foreign data. Careto was
live for many years until it was unmasked and then it’s centralized server went
offline , but still there are many possibilities of Careto that can be run
privately for any planned attack .
Careto was written by highly professional people which consist
of a sophisticated malware, a rootkit, a boot kit , MacOS X, some version of
Linux as well as mobile platform of iOS and android . Which mean it can act
according to the victims’ system architecture.
CARETO STRING |
How does Careto work?
It consists of phishing email with a link to malicious website
, the malicious website contains many
exploits which inject according to the victim’s OS architecture as the malware
has been already designed for dynamic platform. When an user click on the
link , then the malcious website inject
the exploits into the user’s system and after successfully injecting , it redirect
the user to the original website that was stated in the phished email.
It capture nearly 50 file types including doc , pdf, encryption key, server SSH key and RDP files which are used to identify the users and build remote desktop connection , and many more file types .
This malware is highly modular that it can interact with
almost all communication channels , it support plugins as well as it can also
intercept with flash players .
The game of malware, virus and other threats will never end
as each and every hacker and criminals builds new and new type of threats and
many people will be victims till it is discovered
by the security researcher . So it is better to protect you system and device
from day to day cyber threats .
It is very important to Install a security software in your
system .
Avoid attachment from unknown senders
Download music, videos, apps, eBooks from only official and
trusted sources .
Check the link sent by anyone and think twice before you
click .
Stay updated with cyber threats , virus, malware by subscribing
to security blogs .
If you find any unknown weird activates in your system or in
someone system then report it to security researcher , it may help them to
discover new threats .
0 comments:
Post a Comment