Breaking News

Silicon Power Launches MP10 Magnetic 10,000mAh Power Bank Samsung Launches New SSD T7 Resurrected NIKON RELEASES FIRMWARE VERSION 3.00 FOR THE NIKON Z F WITH NEW IN-CAMERA FILM GRAIN FEATURE AND MORE COLORFUL Expands B850 Motherboard Lineup with New CVN, Battle-Ax, and MEOW Models HighPoint Unveils the MCIO-PCIEX16-G5

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Cisco Identifies Virus That Kills Off PCs

Cisco Identifies Virus That Kills Off PCs

PC components May 5,2015 0

Researchers have discovered "Rombertik," a computer virus that tries to avoid detection by making the computer it infects unusable. Once it's triggered, the virus deletes key files on a computer, making it constantly restart. On Windows machines where it goes unnoticed, the malware steals login data and other confidential information.

According to Talos, Romberik is a complex piece of malware that is designed to hook into the user’s browser to read credentials and other sensitive information for exfiltration to an attacker controlled server.

Rombertik has been identified to propagate via spam and phishing messages sent to would-be victims. Like other spam and phishing campaigns, attackers use social engineering tactics to entice users to download, unzip, and open the attachments that ultimately result in the user’s compromise.

The process by which Rombertik compromises the target system is a fairly complex with anti-analysis checks in place to prevent static and dynamic analysis. Upon execution, Rombertik will stall and then run through a first set of anti-analysis checks to see if it is running within a sandbox. Once these checks are complete, Rombertik will proceed to decrypt and install itself on the victims computer to maintain persistence. After installation, it will then launch a second copy of itself and overwrite the second copy with the malware’s core functionality. Before Rombertik begins the process of spying on users, Rombertik will perform once last check to ensure it is not being analyzed in memory. If this check fails, Rombertik will attempt to destroy the Master Boot Record and restart the computer to render it unusable.

The malware "indiscriminately" steals data entered by victims on any website, the researchers said.

Good security practices, such as making sure anti-virus software is installed and kept up-to-date, not clicking on attachments from unknown senders, and ensuring robust security policies are in place for email (such as blocking certain attachment types) can go a long way when it comes to protecting users.

Tags: Virus
Previous Post
Samsung Delivers Faster Speeds With New PRO Plus and EVO Plus Memory Cards
Next Post
Intel Xeon E7 v3 Processor Series Debuts

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

  • Stuxnet Roots Found Back in 2005

Latest News

Silicon Power Launches MP10 Magnetic 10,000mAh Power Bank
Consumer Electronics

Silicon Power Launches MP10 Magnetic 10,000mAh Power Bank

Samsung Launches New SSD T7 Resurrected
Consumer Electronics

Samsung Launches New SSD T7 Resurrected

NIKON RELEASES FIRMWARE VERSION 3.00 FOR THE NIKON Z F WITH NEW IN-CAMERA FILM GRAIN FEATURE AND MORE
Cameras

NIKON RELEASES FIRMWARE VERSION 3.00 FOR THE NIKON Z F WITH NEW IN-CAMERA FILM GRAIN FEATURE AND MORE

COLORFUL Expands B850 Motherboard Lineup with New CVN, Battle-Ax, and MEOW Models
PC components

COLORFUL Expands B850 Motherboard Lineup with New CVN, Battle-Ax, and MEOW Models

HighPoint Unveils the MCIO-PCIEX16-G5
Enterprise & IT

HighPoint Unveils the MCIO-PCIEX16-G5

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed