Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ShadowAce

According to Netlab, RotaJakiro supports 12 commands, including “Steal Sensitive Info,” “Upload Device Info,” “Deliver File/Plugin,” and three “Run Plugin” variants.

This article sounds like FUD designed to pitch security software.

For one, I seriously doubt any malware is going to have a function so obviously labeled “Steal Sensitive Info”. Secondly, what would constitute “sensitive info”?


16 posted on 04/30/2021 9:17:41 AM PDT by Flick Lives (“Today we celebrate the first glorious anniversary of the Information Purification Directives.”)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: Flick Lives

https://blog.netlab.360.com/stealth_rotajakiro_backdoor_en/


27 posted on 04/30/2021 10:06:14 AM PDT by TexasGator (Z1z)
[ Post Reply | Private Reply | To 16 | View Replies ]

To: Flick Lives
what would constitute “sensitive info”?

Yup--the NSA approach is best. Vacuum up everything--then sort it out...

:-)
30 posted on 04/30/2021 12:14:21 PM PDT by cgbg (A kleptocracy--if they can keep it. Think of it as the Cantillon Effect in action.)
[ Post Reply | Private Reply | To 16 | View Replies ]

To: Flick Lives
Still, gotta love the punchline:
According to Netlab, RotaJakiro supports 12 commands, including "Steal Sensitive Info," "Upload Device Info," "Deliver File/Plugin," and three "Run Plugin" variants. The security firm is presently unaware of what the malware's plugins do.

32 posted on 05/01/2021 5:21:36 AM PDT by SunkenCiv (Imagine an imaginary menagerie manager imagining managing an imaginary menagerie.)
[ Post Reply | Private Reply | To 16 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson