Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ShadowAce

hos is this malware acquired?


3 posted on 07/08/2022 12:02:00 PM PDT by Bob434 (.)
[ Post Reply | Private Reply | To 2 | View Replies ]


To: Bob434

Good question. The article is rather light on details.


4 posted on 07/08/2022 12:04:35 PM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 3 | View Replies ]

To: Bob434
"hos is this malware acquired?"

Microsoft Warns of '8220 Group' Targeting Linux Servers

... [T]he names of the group come from the port number 8220 used by the miner to communicate with the C2 servers....

https://www.cysecurity.news/2022/07/microsoft-warns-of-8220-group-targeting.html



How is this malware acquired?

Step 1: Stand up a C2 server.

Step 2: Doesn't matter unless you've stood up a C2 (command & control) server.

6 posted on 07/08/2022 12:26:46 PM PDT by Paal Gulli
[ Post Reply | Private Reply | To 3 | View Replies ]

To: Bob434

It comes via a “dropper” Bob. Same as with MS Trojans. The user has to click something. This is why I use NoScript for websurfing. It reduces the chance of loading malicious scripts and droppers from websites, the other methods are already known as safe practice to prevent it.

“A dropper is a small helper program that facilitates the delivery and installation of malware. Spammers and other bad actors use droppers to circumvent the signatures that anti-virus programs use to block or quarantine malicious code. It’s much easier to change the dropper, should its signature become recognized, than it would be to rewrite the malicious codebase.

“Droppers, like many of their larger Trojan horse counterparts, can be persistent or non-persistent. Non-persistent droppers install malware and then automatically remove themselves. Persistent droppers copy themselves to a hidden file and stay there until they complete the task they were created for.

Droppers can be spread by people who:

Open an infected e-mail attachment.
Pick up a drive-by download on an infected website.
Click on a malicious link in an email or on a website.
Using an infected flash drive.

Sometimes droppers are bundled with free utility programs (such as ad blockers) to avoid detection by antivirus software. When the free program executes, the dropper will first download and install malware before it unpacks and installs the legitimate utility.”

https://www.techtarget.com/whatis/definition/dropper


12 posted on 07/11/2022 4:35:34 AM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 3 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson