Is Your Computer Being Controlled by a Cybercrook?

Is Your Computer Being Controlled by a Cybercrook?

ID: 25533

McAfee warns that cybercriminals can now use social media and malicious websites to create and manage botnets


(PresseBox) - Cybercrooks have long been using botnets, or networks of remotely-controlled, infected computers, for malicious purposes. Now it is possible for cybercriminals to infect computers via dangerous websites, and control computers using social networking sites such as Twitter and LinkedIn.
The increasing popularity of social networking has created an emerging avenue for botnet distributors that is rich with potential. Since botnets are a continuing threat, you should be aware of how cybercrooks use them, and how to keep your computer from being part of the problem by not spreading the infection.
The Hook: Cybercriminals create malware designed to infect your machine with "bots", or automated software programs that can execute remote commands, without your knowledge.
They then send out spam emails and instant messages (IM), enticing you to click on a link by mentioning a current news topic or popular artist. If you click on the link, a bot may unknowingly be downloaded onto your computer.
Once your computer is infected, the cybercrook can access and control your computer-and thousands of other infected machines-with the intent of sending spam email, to your friends and family, spreading malware disguised as a personal message from you.
The Latest Methods:
1) Social botnets- Social networking sites like Twitter and LinkedIn provide cybercrooks a simple, yet elusive way to control the bot networks, allowing them to spread spam and malware at will.
For example, it is now possible for cybercrooks to write basic code telling botnets to follow commands given by "(at)botcommand" on Twitter. To get the botnet to send spam, download a dangerous file, or launch a denial of service attack, all the cybercrook has to do is type in a simple command over Twitter.
Criminals can send the same kinds of commands on other platforms. On LinkedIn, for example, the cybercrook can create a profile and program bots to follow any command given by that profile. These applications serve solely as a means to send commands, and since they are so widely used and distributed, it is almost impossible to track the cybercrooks.




2) Bot kits-New "exploit kits" are available on the Internet that allow cybercrooks to remotely install software on infected machines and control them through a website. The way it works is pretty clever-the cybercrook simply sends out spam emails or spam instant messages containing links to a website that has the exploit kit installed.
Once the user clicks on the link, the kit determines which exploit to use, based on the user's country, operating system and browser. With the exploit successfully installed, the cybercrook gains remote access to your machine.
3) P2P botnets-Bots controlled by peer-to-peer (P2P) networks are some of the most common botnets we see today. Like social bots, there is no central command, making them difficult to detect. However, they work quite differently. The cybercrook logs onto the P2P network and "pings" the network to see which bots are close by. Responding bots then take commands from a nearby server.
The Dangers: If your computer is part of the botnet, you are unwittingly helping the cybercriminals execute their crimes. Furthermore, your own computer and personal information is at-risk. A cybercrook could instruct the bot to disable your security software or access personal files. And, if your computer is being used to send a lot of spam, it could significantly slow down your machine.
Bottom Line: Cybercriminals continue to come up with new and easy ways to distribute and manage botnets. To avoid being part of the problem, keep your computer protected and learn more about how botnets work.
Tips to Avoid Becoming a Victim:
1. Never click on a link in a spam email or IM from someone you don't know-it might download a bot onto your machine without your knowledge.
2. Turn your computer off when you are not using it - when you are disconnected from the Internet cybercrooks can't access your machine
3. Use comprehensive security software, like McAfee Total Protection(TM) software, to protect you from viruses, spam, and other Internet threats, and keep the software up-to-date.
4. When surfing the web, always use a safe search plug-in, such as McAfee® SiteAdvisor® technology, which warns you of potentially dangerous sites right in your search results
5. Set your operating system and browser to automatically apply updates.
Tips on What to Do If You Have Become a Victim:
You're think your computer is part of a botnet, now what?
1. First, check to see if your Internet connection is inexplicably slow. This might be because the bot is using your connection to send and receive data.
2. If you have a Windows machine, open the network tab under the Task Manager to see if your PC is using the Internet connection, and check to see how much bandwidth it is using. If it is more than a few percent, it is possible you have a bot.
3. If you believe you're infected, disconnect from the Internet modem or router immediately. Reboot your computer in safe mode and run a full virus scan to remove any malicious code.
To sign up to receive alerts by email, please visit: http://home.mcafee.com/consumer-threats-signup

Unternehmensinformation / Kurzprofil:
drucken  als PDF  an Freund senden  Expanded channel Support Drives Availability of AMD Opteron(TM)  6100 Series-based Products for HPC, Enterprise and SMB Environments For street lighting, building automation and smart applications: M306S0F8DGP 16-bit MCU supports interference-free data communication over power lines
Bereitgestellt von Benutzer: PresseBox
Datum: 29.09.2010 - 16:56 Uhr
Sprache: Deutsch
News-ID 25533
Anzahl Zeichen: 0

contact information:
Town:

Unterschleißheim



Kategorie:

Hazadous Materials Management



Diese Pressemitteilung wurde bisher 262 mal aufgerufen.


Die Pressemitteilung mit dem Titel:
"Is Your Computer Being Controlled by a Cybercrook?"
steht unter der journalistisch-redaktionellen Verantwortung von

McAfee GmbH (Nachricht senden)

Beachten Sie bitte die weiteren Informationen zum Haftungsauschluß (gemäß TMG - TeleMedianGesetz) und dem Datenschutz (gemäß der DSGVO).

McAfee Survey Reveals Older Does Not Mean Wiser ...

0.2013 - McAfee today released findings from the company's first survey dedicated to uncovering the online habits and behaviors of individuals ages 50-75. The study, "Fifty Plus Booms Online" indicates that the 50+ demographic is spend ...

McAfee Warns Consumers of The "Twelve Scams of Christmas" ...

11.2011 - 'Tis the season for consumers to spend more time online-shopping for gifts, looking for great holiday deals on new digital gadgets, e-planning family gettogethers and of course, using online or mobile banking to make sure they can affo ...

Scams are in the Air...This Valentine's Day ...

With Valentine's Day around the corner, many of us single people return to thoughts of finding love online. But while your head is in the online clouds, you should know - and sorry to sound like a parent - that cyberscammers may be there with y ...

Alle Meldungen von McAfee GmbH



 

Werbung



Facebook

Sponsoren

foodir.org The food directory für Deutschland
News zu Snacks finden Sie auf Snackeo.
Informationen für Feinsnacker finden Sie hier.

Firmenverzeichniss

Firmen die firmenpresse für ihre Pressearbeit erfolgreich nutzen
1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z