Trojan remain undetected for two years while infecting over 3m computers

Discussion in 'other security issues & news' started by hawki, Jun 9, 2021.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "A malicious trojan that want unreported has managed to steal 1.2TB of personal data including passwords, cookies and files from unsuspecting users online...

    The malware was successfully able to steal 26m credentials from around 1m different websites...

    The malware also stole over 6.6m files stored on the desktops and Downloads folders of victims including text files, image files and other documents..."

    https://www.techradar.com/news/this-unreported-trojan-managed-to-steal-12-tb-of-personal-data
     
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    The article confirms something else. Where you can plainly see that trend will always continue due to the fact that every new year "noobs" come online with their own machines and don't know a lick about SERIOUS security preventions that can at least be drastically limited if not curtailed altogether such stealth intrusions with the proper attention=Lots of effort and TIME. (Time most of those users will never spend shoring up the machines)

     
    Last edited: Jun 9, 2021
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Is this trojan nameless or what? But yes, no surprise, AV's will often don't block data exfiltration if they can't identify the malware. And the thing is, you won't even notice that data has been stolen. So a bit of extra protection from anti-loggers is always helpful. And of course you shouldn't be downloading cracked software in the first place.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.