🔥Early Access List: Land A High Paying Web3 Job In 90 Days LEARN MORE

2 Malware modification combinations allow hacking of social media networking sites

In this post:

In the recent past, Kaspersky technicians issued stern security warning over malware modification combinations of two android trojans that could get access to internet users’ cookies and control their browsing.

Malware modification combinations ‘fish’ crypto accounts logins

The researchers indicate that once the two malware modification combinations are used together, they enable hackers to steal cookies gathered from victims browsing on social media. Thereafter, the hackers have complete access of the users’ accounts and manipulate the content and infect the victims system.

Cookies are bits of information that are gathered by websites in order to determine what users are browsing for better and customized browsing experience in the future.

Moreover, cookies are utterly harmless though they are a nuisance to some internet users. However. Cookies can be a source of great risk while on the hackershands since they are critical in the identification of users without the need for their login data.

Once the hackers get control to the userscookies, they cheat the browsing website to think they could be the original users, gaining access to their accounts. That is the reason the malware hackers created the two malware modification combinations in order for them to get user accounts. The first malware acquires the rooting rights on victims’ devices which allows them to transfer cookies to their own servers.

See also  AI-focused Masaaki Taira appointed Japan's digital minister, crypto holders cross fingers on tax issue

Scattered evidence points towards phishing attacks

Websites currently have security interventions that obstruct criminal activity by identification of the login data from other devices and ticking them as abnormal. Mostly, crypto hackers look for logins to online cryptocurrency accounts where they steal crypto deposits from unsuspecting victims. Now, the second malware is for bypassing these security protocols as it executes a proxy server on the gadget of the victim.

Hackers pose as original users and therefore, hijack networking accounts to distribute any content of their own will. The purpose behind this heinous activity is yet to be identified by the researchers although scattered evidence points towards phishing attacks.

Experts suggest in solving the problem to block third-party cookies, erasing them from the system altogether and using security interventions to protect users browsing a website.

.

Share link:

Disclaimer. The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decisions.

Most read

Loading Most Read articles...

Stay on top of crypto news, get daily updates in your inbox

Related News

Cryptopolitan
Subscribe to CryptoPolitan

Interested in launching your Web3 career and landing a high-paying job in 90 days?

Leading industry experts show you how with this brand new course: Crypto Career Launchpad

Join the early access list below and be the first to know when the course opens its doors. You’ll also save $100’s off the regular launch price.