Public WiFi- A New Way to Spread Malware
By MYBRANDBOOK
Attackers are using unsecured Wi-Fi networks as a way to deliver the malware to more devices. A new malware, called Emotet has the capability to help spread their malware to more victims. This malware can also spread from one device to another by creating a botnet that helps deliver additional spam and emails. It spreads across an unsecured public Wi-Fi network by taking advantage of weak passwords and other security flaws.
The researchers have found that some versions of Emotet can be spread across an unsecured WiFi network by taking advantage of weak passwords and other security flaws. While these types of infections are rare, it's important to keep an eye on how the Trojan's creators are attempting new methods.
Some Emotet samples in campaigns leveraging WiFi that researchers examined in January contained a timestamp dated April 16, 2018, which suggests that the capability to spread the malware through poorly secured WiFi networks may have gone unnoticed until now. In these campaigns, once attackers infect a device with the Trojan, it starts to download what the researchers call a WiFi spreader module, which contains two binaries. One of these binaries, called worm.exe, begins to list all the WiFi-enabled devices that are connected with the infected device.
The binary also extracts a list of reachable wireless networks using the wlanAPI interface found in later versions of Microsoft Windows, according to the report. This interface helps manage WiFi connections and network profiles in some versions of Windows.
Once the list of all WiFi networks and devices is gathered, the binary then begins to use a brute force attack to guess the usernames and passwords of the wireless networks, looking for one it can crack. The Emotet malware has an internal list of passwords that it uses as part of this brute force attack.
It has been recommended by researchers that the IT and security teams should take the time to create stronger passwords for WiFi networks to ensure that these brute force attacks are less likely to be successful.
Nazara and ONDC set to transform in-game monetization with ‘
Nazara Technologies has teamed up with the Open Network for Digital Comme...
Jio Platforms and NICSI to offer cloud services to government
In a collaborative initiative, the National Informatics Centre Services In...
BSNL awards ₹5,000 Cr Project to RVNL-Led Consortium
A syndicate led by Rail Vikas Nigam Limited (abbreviated as RVNL), along wi...
Pinterest tracks users without consent, alleges complaint
A recent complaint alleges that Pinterest, the popular image-sharing platf...
INFOSYS TECHNOLOGIES PVT. LTD.
BEETEL TELETECH LTD.
DATA SAFEGUARD INDIA PRIVATE LIMITED
NETWEB TECHNOLOGIES INDIA LTD.
Icons Of India : GAUTAM ADANI CHAIRMAN ADANI GROUP
Gautam Adani is the Founder and Chairman of the Adani Group, which ran...
Icons Of India : Dr. Sanjay Bahl
Dr. Sanjay Bahl has around four decades of experience in the ICT indus...
ICONS OF INDIA : RAMESH NATRAJAN
Ramesh Natarajan, CEO of Redington Limited, on overcoming ‘technolog...
GSTN - Goods and Services Tax Network
GSTN provides shared IT infrastructure and service to both central and...
TCIL - Telecommunications Consultants India Limited
TCIL is a government-owned engineering and consultancy company...
CERT-IN - Indian Computer Emergency Response Team
CERT-In is a national nodal agency for responding to computer security...
Indian Tech Talent Excelling The Tech World - ARVIND KRISHNA, CEO – IBM
Arvind Krishna, an Indian-American business executive, serves as the C...
Indian Tech Talent Excelling The Tech World - Sundar Pichai, CEO- Alphabet Inc.
Sundar Pichai, the CEO of Google and its parent company Alphabet Inc.,...
Indian Tech Talent Excelling The Tech World - JAYASHREE ULLAL, President and CEO - Arista Network
Jayshree V. Ullal is a British-American billionaire businesswoman, ser...