Hackers rely on a set of hacking tools to help them break into systems, which are now being infected with malware.
As TechCrunch reports, it seems hackers are turning on their own and trying to infect other hackers by installing a remote access trojan. The "no honor among thieves" attacks were discovered by Cybereason researcher Amit Serper.
“If hackers are targeting you or your business and they are using these trojanised tools it means that whoever is hacking the hackers will have access to your assets as well,” said Amit Serper of Cybereason, a security company.
Chilling video released of hacker talking through smart camera
These malicious hacking tools are not only a gateway to the hacker’s systems but also any system that the hacker has already breached.
It has not been established who started this campaign and for what reason. However, the most obvious reason is perhaps to gain access to compromised systems by stealing the work of other hackers.
Moreover, according to cybereason the threat actors are hacking vulnerable WordPress installations to host their malicious njRat payloads and it seems as if they are building new iterations of their hacking tools on a daily basis.
Hacker used $35 computer to steal NASA data
The malware dates back to 2013 when it was primarily used in the Middle East and is spread through emails and infected flash drives and in 2017 hackers used the malware on a website for Islamic State’s propaganda unit.
This article originally published on TechCrunch.
COMMENTS
Comments are moderated and generally will be posted if they are on-topic and not abusive.
For more information, please see our Comments FAQ