5 Ways Malware Can Creep into Your System

Discussion in 'malware problems & news' started by ronjor, Apr 13, 2016.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,798
    Location:
    Texas
  2. ExtremeGamerBR

    ExtremeGamerBR Registered Member

    Joined:
    Aug 3, 2010
    Posts:
    1,115
    If you do not need to run anything, how this malware installs itself? It could gain administrator rights without actually being run by a user?

    Thanks for the article!
     
  3. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    57,798
    Location:
    Texas
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,046
    Location:
    The Netherlands
    If the malware needs admin rights and UAC is enabled, it won't be able to run without the users permission. But some malware don't need admin rights, so it's always best to use anti-exploit, white-listing and sandboxing.
     
  5. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    441
    Location:
    The Outer Limits
    None of this will help against a phishing attack where the info is simply gleaned via a return email and thereby hundreds of employees bank details and social security numbers are delivered to the criminals.

    This actually happened at my sisters workplace a couple of months ago.Thankfully she was on the ball and able to freeze and block her bank account pronto.

    No need to install or circumvent anything, really chilling in it`s simplicity.

    Regards Eck:)
     
    Last edited: Apr 17, 2016
  6. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    2,509
    Location:
    Slovakia
    Majority of malware create a startup entry and after restart it has admin rights. Scripting can be also used to elevate a process. Disabling VBS and powershell protects against 99% of infections, since it is like javascripts in browsers and without it, there are not many ways to actually do anything.
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,046
    Location:
    The Netherlands
    Yes correct, but the article is about malware not about phishing.
     
  8. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    441
    Location:
    The Outer Limits
    It mentions Spear Phishing i.e. fraudulent emails designed to glean confidential info.

    Regards Eck :)
     
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,046
    Location:
    The Netherlands
    Correct, but it mentions "Spear Phishing" as a way to get malware on the system, and this malware will be easily stopped by the tools that I mentioned.
     
  10. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    441
    Location:
    The Outer Limits
    The attack is merely someone pretending to be an employee requesting info to be sent via return email.

    There is nothing actually malicious needed to be installed for attack to be successful.

    As simple as that and very nastie.

    Regards Eck:)
     
  11. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    8,046
    Location:
    The Netherlands
    I think the article is a bit confusing, because it's supposed to be about malware, but then it mentions the Snapchat attack, where no malware was involved. But I'm talking about stuff like this: https://www.invincea.com/use-cases/attack-techniques/spear-phishing/
     
  12. Behold Eck

    Behold Eck Registered Member

    Joined:
    Aug 23, 2013
    Posts:
    441
    Location:
    The Outer Limits
    Yes that would explain the "Spear" in the phising where the sensible security measures as you mentioned would more than deal with it.

    Regards Eck:)
     
  13. Umbra

    Umbra Registered Member

    Joined:
    Feb 10, 2011
    Posts:
    2,211
    Location:
    in a remote land :)
    The human factor is the weak link in the chain of security, it was and will always be.
     
Loading...