New Malware Installs When Victims Download Pirates

Share post:

A newly discovered malware called Vigilante is installed when victims download and run what they believe to be counterfeit software or games.

Once inside the system, the malware reports the file name that has been executed to an attacker-controlled server, along with the IP address of the victim’s computer.

Towards the end, Vigilante modifies the victims’ computers so that they can no longer access thepiratebay.com and 1,000 other pirate sites.

Specifically, the malware updates Hosts, a file that pairs one or more domain addresses to different IP addresses.

By assigning the domains to the local host, the malware ensures that the computer can no longer access the pages, and the only way to reverse the block is to edit the Hosts file to remove the entries.

Many of the trojanized executables are digitally signed using a fake code-designing tool.

The signatures consist of a series of randomly generated 18-character uppercase and lowercase letters. The validity of the certificate began on the day of availability of the files and ends in 2039.

Properties of the executable files do not match the filename.

The good thing is that Vigilante is not good at perpetuating itself, which means that it has no way to stay installed. Users who have been infected just need to edit their Hosts file to get disinfected.

For more information, read the original story in Arstechnica.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways