D2
Администратор
- Регистрация
- 19 Фев 2025
- Сообщения
- 4,380
- Реакции
- 0
I am MRDEVILX and i write this blog specially for xss.is members
WHAT IS MALWARE
Malware is a malicious software that is used to harm an computer or server or network
TPES OF MALWARE
Types of malware include computer virus, worm, trojan, ransomware spyware.
,adware,rootkit,backdoor,rats
A virus is the most common and used type of malware that can execute there self or spread there self by Infecting other files
A worm can self replicate without host and it can execute there self worm is better in the meaning of spread because they can spread there self without any Interaction of developer or user and worm replicate themselves to spread into networks.
A Trojan horse is develop to appear as legit software program to gain access of victims system once the Trojan horse activated in the system it can execute there different plugins like passwords extractor uac bypass etc
A spyware collects information and data on the device from user silently also it can observer the activity
A ransomware encrypt the data of system
A backdoor virus or remote access trojan we also know them with the name of RAT
silently create an backdoor into infected system that allow to monitor file share or remotely access
A adware track users browser history as well as download history
A keylogger will be used to monitor every single key which press by the user right now in keylogger many features are coming like passwords steal cc credit card steal etc
This type of malicious program use to steal the data from users system or may be delete the data from user system and if the user got hit by ransomware there whole system would be encrypted and the hacker would be ask for an ransom if the users doesn't t t tt pay the desire amount of ransom the hacker will not decrypt there data in simple words the hacker will not give there data back or may be it leak in some high reputable forums
HOW ATTACKERS SPREAD MALWARE
As you guys know malware can be used to infect networks systems devices servers
Hackers use a verity of methods to spread there malware by physically or virtually from physically I mean the virus would be delivered in the form of an USB through popular tools that's the reason mostly security researchers always ask not to put any USB which you got from public places and in virtually the attacker can deliver there malware in the form of any software mostly attacker spreading there malwares in the form of legit and premium softwares on the name of crack if I explain if you have interest in games then definitely you will not going to purchase all premium games you will search on Google about crack games and you can get website and download the attacker will attach there malware with this game same for different programs like premium antiviruses premium vpns etc
Now a days attackers also using ads services they create an website an upload bunch of premium tools for free and then run ads from Google ads , Facebook ads, twitter ads quora ads etc they also doing cold email spreading they can gether your email and then send the emails including the download link of malware
Later on we also learn how an rat work and how to use rat so we learn how we can protect our self from this type of malwares
SIGNS OF MALWARE
Not all malware is obvious like ransomware mostly malware run silently and do there job in background of your system
Here are some signs which indicate that's system is compromised
1 ads that popup again and again after every page load
2 open any website randomly in your system
3 open any music randomly
4 slow speed of your system now a days attackers attach miner with the malware they will get your data as well as they will mine eth or any coun from your system
5 your email or social media friend received random messages
6 you are not able to open windows defender
7 you are not able to open control panel
In short computer will behave unsuall or slow performance or unexpected popular change in browser settings unfamiliar program running in background etc
From which type of files you are able to get infected
Mostly attackers use .exe by binding in legit softwares like game antiviruses vpns etc second they also can so extension spoofing from extension spoofing they are able to spoof the extension of malware from .exe to .mp3 .mp4 .txt
And also don't click on any invalid website the attacker can grab your ip address and he can use for location and in kali Linux tool there is name beef exploitation tool with the help of this tool you can create an website and add malicious code when the user click on website it will get infected and you have a bunch of things to do this one can work for both android and also for Windows attacker also able to execute there malware when you open your chrome browser you will get an popup something like your chrome browser is old and need updates click to doenload when you click to download the malware download and that's not chrome that's an attacker payload
ROLE OF ARTIFICAL INTELLIGENCE IN MALWARE
Now a days attackers also using chatgpt by bypass there algorithm then chatgpt will write anything like any malware any ip grabber any ip scanner any Cookie stealer and attacker also using chatgpt to write an aes encryption based code where they will add an direct download link of malware and then compile and this also worked aes encryption is the most powerful encryption let discuss about aes encryption
Aes is also stand for advance encryption standard is a symmetric encryption. It is encryption whuch is used in the whole world and developer addopted this encryption it help for secure data in many applications includes data storage, communication protocol it is also used by government departments to protect sensitive details .It is a cryptographic cipher that work on fixed size of data more aes has 3 key : 128, 192 or 256 bits 128 is most commonly used .
MOST USED STEALERS
Raccoon stealer first reported in 2019 there developer arrest in 2022 but still raccoon stealer is active with the name of raccoon stealer 2.0 the fbi identity the raccoon stealer have steal more then 50 million usd
Rhadamanthys stealer first reported in 2022 and still active in market
Redline stealer is first come in 2020 march there developer is not more active but there cracked version is still working redline steal more 170 million
HOW PROTECT YOUR SELF
Use paid antiviruses mostly attackers able to bypass antiviruses but something is better then nothing
And then use edr it's better then antiviruses like crowd strike but still able to bypass the most powerful protection which I used for my self is osarmor
It's paid some 20 usd for year but currently it's best protection I have used many method to test I also use side dl loading method in this method the payload will be executed in memory mostly antiviruses would be bypass but the osarmor detected malware they also have free version but they stop updates for free version then for networks use ips and ids system or set snorts for hacker snorts work like honey to catch the hackers
WHAT IS MALWARE
Malware is a malicious software that is used to harm an computer or server or network
TPES OF MALWARE
Types of malware include computer virus, worm, trojan, ransomware spyware.
,adware,rootkit,backdoor,rats
A virus is the most common and used type of malware that can execute there self or spread there self by Infecting other files
A worm can self replicate without host and it can execute there self worm is better in the meaning of spread because they can spread there self without any Interaction of developer or user and worm replicate themselves to spread into networks.
A Trojan horse is develop to appear as legit software program to gain access of victims system once the Trojan horse activated in the system it can execute there different plugins like passwords extractor uac bypass etc
A spyware collects information and data on the device from user silently also it can observer the activity
A ransomware encrypt the data of system
A backdoor virus or remote access trojan we also know them with the name of RAT

silently create an backdoor into infected system that allow to monitor file share or remotely access
A adware track users browser history as well as download history
A keylogger will be used to monitor every single key which press by the user right now in keylogger many features are coming like passwords steal cc credit card steal etc
This type of malicious program use to steal the data from users system or may be delete the data from user system and if the user got hit by ransomware there whole system would be encrypted and the hacker would be ask for an ransom if the users doesn't t t tt pay the desire amount of ransom the hacker will not decrypt there data in simple words the hacker will not give there data back or may be it leak in some high reputable forums
HOW ATTACKERS SPREAD MALWARE
As you guys know malware can be used to infect networks systems devices servers
Hackers use a verity of methods to spread there malware by physically or virtually from physically I mean the virus would be delivered in the form of an USB through popular tools that's the reason mostly security researchers always ask not to put any USB which you got from public places and in virtually the attacker can deliver there malware in the form of any software mostly attacker spreading there malwares in the form of legit and premium softwares on the name of crack if I explain if you have interest in games then definitely you will not going to purchase all premium games you will search on Google about crack games and you can get website and download the attacker will attach there malware with this game same for different programs like premium antiviruses premium vpns etc
Now a days attackers also using ads services they create an website an upload bunch of premium tools for free and then run ads from Google ads , Facebook ads, twitter ads quora ads etc they also doing cold email spreading they can gether your email and then send the emails including the download link of malware
Later on we also learn how an rat work and how to use rat so we learn how we can protect our self from this type of malwares
SIGNS OF MALWARE
Not all malware is obvious like ransomware mostly malware run silently and do there job in background of your system
Here are some signs which indicate that's system is compromised
1 ads that popup again and again after every page load
2 open any website randomly in your system
3 open any music randomly
4 slow speed of your system now a days attackers attach miner with the malware they will get your data as well as they will mine eth or any coun from your system
5 your email or social media friend received random messages
6 you are not able to open windows defender
7 you are not able to open control panel
In short computer will behave unsuall or slow performance or unexpected popular change in browser settings unfamiliar program running in background etc
From which type of files you are able to get infected
Mostly attackers use .exe by binding in legit softwares like game antiviruses vpns etc second they also can so extension spoofing from extension spoofing they are able to spoof the extension of malware from .exe to .mp3 .mp4 .txt
And also don't click on any invalid website the attacker can grab your ip address and he can use for location and in kali Linux tool there is name beef exploitation tool with the help of this tool you can create an website and add malicious code when the user click on website it will get infected and you have a bunch of things to do this one can work for both android and also for Windows attacker also able to execute there malware when you open your chrome browser you will get an popup something like your chrome browser is old and need updates click to doenload when you click to download the malware download and that's not chrome that's an attacker payload
ROLE OF ARTIFICAL INTELLIGENCE IN MALWARE
Now a days attackers also using chatgpt by bypass there algorithm then chatgpt will write anything like any malware any ip grabber any ip scanner any Cookie stealer and attacker also using chatgpt to write an aes encryption based code where they will add an direct download link of malware and then compile and this also worked aes encryption is the most powerful encryption let discuss about aes encryption
Aes is also stand for advance encryption standard is a symmetric encryption. It is encryption whuch is used in the whole world and developer addopted this encryption it help for secure data in many applications includes data storage, communication protocol it is also used by government departments to protect sensitive details .It is a cryptographic cipher that work on fixed size of data more aes has 3 key : 128, 192 or 256 bits 128 is most commonly used .
MOST USED STEALERS
Raccoon stealer first reported in 2019 there developer arrest in 2022 but still raccoon stealer is active with the name of raccoon stealer 2.0 the fbi identity the raccoon stealer have steal more then 50 million usd
Rhadamanthys stealer first reported in 2022 and still active in market
Redline stealer is first come in 2020 march there developer is not more active but there cracked version is still working redline steal more 170 million
HOW PROTECT YOUR SELF
Use paid antiviruses mostly attackers able to bypass antiviruses but something is better then nothing
And then use edr it's better then antiviruses like crowd strike but still able to bypass the most powerful protection which I used for my self is osarmor
It's paid some 20 usd for year but currently it's best protection I have used many method to test I also use side dl loading method in this method the payload will be executed in memory mostly antiviruses would be bypass but the osarmor detected malware they also have free version but they stop updates for free version then for networks use ips and ids system or set snorts for hacker snorts work like honey to catch the hackers