Hackers are hacking other hackers by using malware
Hackers rely on a set of hacking tools to help them break into systems, which are now being infected with trojans
Hackers are attacking other hackers by infecting a wide variety of hacking tools with trojans to compromise their machines.
Hackers rely on a set of hacking tools to help them break into systems, which are now being infected with malware.
As TechCrunch reports, it seems hackers are turning on their own and trying to infect other hackers by installing a remote access trojan. The "no honor among thieves" attacks were discovered by Cybereason researcher Amit Serper.
“If hackers are targeting you or your business and they are using these trojanised tools it means that whoever is hacking the hackers will have access to your assets as well,” said Amit Serper of Cybereason, a security company.
Chilling video released of hacker talking through smart camera
These malicious hacking tools are not only a gateway to the hacker’s systems but also any system that the hacker has already breached.
It has not been established who started this campaign and for what reason. However, the most obvious reason is perhaps to gain access to compromised systems by stealing the work of other hackers.
Moreover, according to cybereason the threat actors are hacking vulnerable WordPress installations to host their malicious njRat payloads and it seems as if they are building new iterations of their hacking tools on a daily basis.
Hacker used $35 computer to steal NASA data
The malware dates back to 2013 when it was primarily used in the Middle East and is spread through emails and infected flash drives and in 2017 hackers used the malware on a website for Islamic State’s propaganda unit.
This article originally published on TechCrunch.
Hackers rely on a set of hacking tools to help them break into systems, which are now being infected with malware.
As TechCrunch reports, it seems hackers are turning on their own and trying to infect other hackers by installing a remote access trojan. The "no honor among thieves" attacks were discovered by Cybereason researcher Amit Serper.
“If hackers are targeting you or your business and they are using these trojanised tools it means that whoever is hacking the hackers will have access to your assets as well,” said Amit Serper of Cybereason, a security company.
Chilling video released of hacker talking through smart camera
These malicious hacking tools are not only a gateway to the hacker’s systems but also any system that the hacker has already breached.
It has not been established who started this campaign and for what reason. However, the most obvious reason is perhaps to gain access to compromised systems by stealing the work of other hackers.
Moreover, according to cybereason the threat actors are hacking vulnerable WordPress installations to host their malicious njRat payloads and it seems as if they are building new iterations of their hacking tools on a daily basis.
Hacker used $35 computer to steal NASA data
The malware dates back to 2013 when it was primarily used in the Middle East and is spread through emails and infected flash drives and in 2017 hackers used the malware on a website for Islamic State’s propaganda unit.
This article originally published on TechCrunch.