logo

About Data Confiance

From the classroom to the operating room, from the stadium field to the manufacturing floor, Data Confiance has the solution for every environment and its challenges
info@dataconfiance.com
Something is wrong.
Instagram token error.

dataconfiance

Follow

Top 5 weirdest Trojans: funny, scary, and strange

Top 5 weirdest Trojans: funny, scary, and strange

Back in the days of MS-DOS, hackers created malware mainly for entertainment purposes, so there were a lot of bizarre and even funny viruses. For example, one simple piece of malware turned the image on the computer screen upside down. A virus called Madman showed users the glaring eyes of a red-faced maniac and told the victims that somebody was watching them and “nothing can save you.” It was chilling back in those days. Really.

View image on Twitter

Of course, there were more dangerous viruses as well. In the year 2000 a criminal sent e-mail messages headed “ILoveYou” that included the malicious attachment LOVE-LETTER-FOR-YOU.TXT.vbs, which was not a text file but rather a Visual Basic script. The “love letter” infected more than 3 million PCs all over the world. The malware was extremely successful: It was 2002’s most widespread computer virus.

But time marches on, and malware has been transformed into something far less entertaining and more malevolent: software meant for one simple purpose — to make its creators rich. Nonetheless, even now it’s possible to find a few viruses that stand out from the crowd. In this post we’ve gathered five examples of weird and wacky malware.

Sociable malware

Even the simplest malware can bring about an emotional response. For example, a classic Skype Trojan simply sent the message “Hi” to everyone in its victims’ contact list each time they were online. The result was pretty predictable: The friends and acquaintances responded — many of them simultaneously. For some users it was such a terrible experience that they called the malware “the worst virus an introvert can face.”

Greedy apps

Trojans that hijack computer performance to mine bitcoins aren’t news. Last year, the developers of several popular Android apps decided to do the same, using smartphones for crunching instead. They even managed to keep it a secret for some time because most people do not install antivirus software on their mobile devices, and the devices were mining only when connected to a charger.

View image on Twitter

But the idea was hopeless from the start. Usually, people use powerful PCs with expensive graphics cards to mine bitcoins because mining involves heavy parallel computing. Mobile devices have never been anywhere near powerful enough for the task: For example, if you’d tried to mine one bitcoin on a top-of-the-line 2015 smartphone (say, the Galaxy S4), the calculations would’ve take 34,000 years. Now it would probably take even longer, as bitcoins are getting harder to crunch. We guess the perpetrators didn’t know much about bitcoins and how they are mined.

 

A kvetching Trojan

While most Android banking Trojans try to stay under the radar, there was one that took a rather different tack: It tried victims’ very last nerve.

View image on Twitter

This Trojan started like many others, slipping onto a smartphone posing as a useful app. Then the malware continuously pestered victims by asking them to grant it admin privileges. When the user closed one window, the Trojan opened another, again and again. The only way to stop it was to power down the phone and restore it to its factory default settings — or to grant the requested rights to the pesky app. (Note: That would be a bad idea.)

Sometimes it’s easier to agree than to keep saying no. Worn out, users assigned the requested privileges to get peace, but the Trojan didn’t stop there: It used the same tactics to become the default SMS app and then to harangue victims into sharing their credit card information. A toddler would envy such persistence.

 

Sir Knight

You might even meet a Don Quixote even among the modern Trojans. Last year, Wifatch, an unusual form of malware, came to light. Or maybe we should call it “goodware.” Wifatch infected Wi-Fi routers and other connected devices and … patched them.

In addition to updating the devices, the program left a message to owners with recommendations to change passwords and update firmware. The problem here is that people often leave the default passwords on their connected devices (routers, Internet of Things devices, etc.) and do not set up them properly. As a result criminals find easy ways to hack such gadgets. The “kind Trojan” attempted to protect people from these and similar troubles.

By the time Wifatch was discovered, its network included tens of thousands of devices in China, Brazil, and the United States.

 A Trojan full of contradictions

Triada is an Android Trojan whose behavior belies its power. And it is very powerful. This malware successfully hacks the very heart of Google’s OS — the Zygote process — and it resides mostly in an infected device’s RAM, which makes it extremely hard to detect.

Finally, Triada has a modular structure. The structure is not unlike the new smartphone concept by Motorola, but here we’re talking about software modules that fit the Trojan with new powerful features, so Triada can sweep through its armory for the most suitable “weapon” — and turn it on users.

If you still don’t believe that this mobile malware is very dangerous, consider this: Security experts say that Triada is just as well written as a computer Trojan. Don’t forget, Windows has been battling malware for years, whereas mobile operating systems are relatively new.

All in all, Triada has a powerful structure but uses it surprisingly naively. Instead of stealing banking data or taking hacked gadgets hostage, it shows advertisements to its victims — like simple adware. The Trojan also spoofs URLs loaded in the browser, and it changes the homepage and default search engine.

View image on Twitter

As its final means of monetizing infected users, Triada waits for a user to buy something in one of the apps — a powerup, game currency, cool add-ons, or something else along those lines. The Trojan swoops in at the moment of purchase and steals the money sent to developers via SMS.

We’re not complaining, but we don’t understand why criminals would create such a powerful and complex solution to fulfill these simple tasks. And besides, they must earn less than developers of traditional lockers or banking Trojans.

As you can see, unusual and odd Trojans still exist. But no matter how funny they can be, this malware is still dangerous — designed to steal money or personal data or otherwise wreak havoc.

If you don’t want to fight with kvetching Trojans, get buried in greetings from sociable Skype malware, or get acquainted with any of other 170 million malicious solutions detected in the first three months of this year, you need a powerful security solution. Kaspersky Internet Security Multi-Device protects your digital life: PC, Mac, and mobile gadgets.

No Comments

Post a Comment

Comment
Name
Email
Website