Tag Archive for: weird

Weird Malware Called Oddball Blocks You From Accessing Piracy Sites Instead Of Hacking Device; What Kind of Sorcery is This?


A weird malware is currently confusing some security experts and researchers. The reason behind this is that this new computer virus seems to have no interest in hacking your device. 

Weird Malware Blocks You From Accessing Piracy Sites Instead Of Hacking Device: Here's How Oddball Works

(Photo : Photo by Justin Sullivan/Getty Images)

Instead, the new Oddball malware blocks explicitly you from accessing piracy websites. Based on its process, some researchers claimed that this could even be a good malware since it can stop people from downloading or viewing paid content for free. 

As of the moment, piracy is still an issue since it can prevent the original creators of new songs, movies, apps, and other things from raising incomes. But, there’s a chance that this new malware could somehow help solve this problem. 

Specifically, involved security researchers confirmed that the new Oddball computer virus blocks infected computers from visiting these illegal websites. However, they did not confirm if the malware can also prevent clean devices. 

Weird Malware Oddball’s Details 

As of the moment, many hacking groups are developing malware and ransomware that could allow them to breach companies’ systems. These include the new ransomware targeting iConstituent, as well as the REvil’s malware. 

Weird Malware Blocks You From Accessing Piracy Sites Instead Of Hacking Device: Here's How Oddball Works

(Photo : Photo by Tomohiro Ohsumi/Getty Images)

Related Article: BUSTED: Ukraine Ransomware Gang Known for Hacking Universities Arrested

But, the new Oddball is not like these computer viruses. According to Threat Post’s latest report, the new malware modifies the HOSTS file on the infected system.

Security experts explained that this method is quite efficient since it can stop the device from access a certain web address, which is the main goal of Oddball. 

However, many techie users can easily prevent the malware’s effect since it has no persistence mechanism. 

“This seems to be a fresh trick on an old attack of compromising people attempting to download pirated software and media,” explained Netenrich’s Threat Intelligence Advisor John Bambenek. 

“In this case though, it seems to be an individual or group trying to protect intellectual property, but make no mistake, this is still clearly criminal behavior,” added the security…

Source…

Try This One Weird Trick Russian Hackers Hate – Krebs on Security


In a Twitter discussion last week on ransomware attacks, KrebsOnSecurity noted that virtually all ransomware strains have a built-in failsafe designed to cover the backsides of the malware purveyors: They simply will not install on a Microsoft Windows computer that already has one of many types of virtual keyboards installed — such as Russian or Ukrainian. So many readers had questions in response to the tweet that I thought it was worth a blog post exploring this one weird cyber defense trick.

The Commonwealth of Independent States (CIS) more or less matches the exclusion list on an awful lot of malware coming out of Eastern Europe.

The Twitter thread came up in a discussion on the ransomware attack against Colonial Pipeline, which earlier this month shut down 5,500 miles of fuel pipe for nearly a week, causing fuel station supply shortages throughout the country and driving up prices. The FBI said the attack was the work of DarkSide, a new-ish ransomware-as-a-service offering that says it targets only large corporations.

DarkSide and other Russian-language affiliate moneymaking programs have long barred their criminal associates from installing malicious software on computers in a host of Eastern European countries, including Ukraine and Russia. This prohibition dates back to the earliest days of organized cybercrime, and it is intended to minimize scrutiny and interference from local authorities.

In Russia, for example, authorities there generally will not initiate a cybercrime investigation against one of their own unless a company or individual within the country’s borders files an official complaint as a victim. Ensuring that no affiliates can produce victims in their own countries is the easiest way for these criminals to stay off the radar of domestic law enforcement agencies.

Possibly feeling the heat from being referenced in President Biden’s Executive Order on cybersecurity this past week, the DarkSide group sought to distance itself from their attack against Colonial Pipeline. In a message posted to its victim shaming blog, DarkSide tried to say it was “apolitical” and that it didn’t wish to participate in geopolitics.

“Our goal is to make…

Source…

Samsung Galaxy Note 10+ review: Weird, but in a good way – Engadget

Samsung Galaxy Note 10+ review: Weird, but in a good way  Engadget

I have to suspect that back in 2011 when the original Galaxy Note was released, not even Samsung knew it would become as popular as it did. By the standards.

“Don’t Plug Your Phone into a Charger You Don’t Own” – read more

Two weird ways your iPhone or Mac can be hacked

Must read: The 2019 iPhone 11 will be annoying, boring, and expensive First, let’s look at how a cable can be used to hack a Mac. Enter the O.MG Cable. This is an Apple Lightning charging cable with a …
mac hacker – read more