Digital security firm PhishMe has found that malware, sent as an attachment in a current phishing email, works by taking screenshots of infected computer systems and returning the images to cyber criminals.
The email pretends to be from HMRC and includes an attachment infecting the recipient’s system with Predator Dynasty – also called Dynasty Keylogger – when run, according to a recent post.
PhishMe’s senior researcher, Ronnie Tokazowski, told SCMagazine.com that the malware can also start persistently, bypass users’ access controls, and take screenshots.
The malware also sends mail messenger, JDownloader, Internet Download Manager, and web browser passwords to the hackers. Additionally, it disables such controls as command prompt, MSconfig, task manager, and regedit, said Tokazowski.
A virtual machine was used to examine the malware, so any screenshots will have shown the analysis being performed. However, Tokazowski turned the tables around and observed the attackers. He commented:
“To watch them, I ran a live network capture while the virtual machine under my control was infected.”
Individuals who have fallen foul of the malware may find that much of their data has been compromised, which could come with serious consequences. A more serious situation would arise if businesses were affected, as their systems could compromise far more than the data of an individual. They would be wise to launch an information security recruitment campaign, to ensure they have more savvy personnel on board who can help to prevent such a breach.
Send us your CV and have our recruiters match you to the ideal opportunities
Do you already have an account with us?Log in
Want to have an account with us?Register
Want to just send us your CV?
By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.