post-image

How to stop hackers from leaking your data: How to protect your privacy

Business

article A new study by a team of Australian researchers suggests that a new piece of malware that makes it possible to steal personal information is being developed in China.

The researchers, who reported their findings in the journal Cyber-Security Letters, used a new version of the malware dubbed Cryptor, which was discovered by security researchers from Symantec in 2015 and has since become the focus of the recent security debate.

The researchers discovered that Cryptor uses a tool that encrypts the data of all connected computers that use its API, which is used to interact with a number of Chinese government agencies, and the Chinese government’s IT security service, the People’s Liberation Army Cyber Command, said in a statement.

“Cryptor encrypts all the data on all the computers that run Cryptor,” said senior researcher Andrew J. Kosten, a senior researcher at the University of Sydney and lead author of the paper.

“The data is encrypted with the same key used by the crypto keys used by other malware,” he said.

“This means that the decryption key used to decrypt the data is also the same as the key used for decrypting the encrypted data.”

Cryptor was discovered in China by a security researcher who used the tools of Cryptor to spy on the personal data of people who are believed to have sensitive information, including their social media accounts.

Kosten said that he first noticed the use of Cryptotracker in November, when the Chinese National Defense Research Institute and the People First Military Development Institute were found to be using the malware to steal data from individuals and organizations, including sensitive financial information.

“They also sent emails and SMS messages containing the Cryptotrace API and Cryptor API keys to hundreds of millions of users around the world,” Kostener said.

Cryptotrackers are designed to infect computers running vulnerable versions of Linux, Windows, MacOS X and iOS with an encrypted version of Cryptorel, and then encrypt data.

Users of infected machines can then decrypt the information that is left, but the decrypted data is never sent to the victims.

Cryptor is a backdoor that was designed to allow malware developers to install code on infected machines to enable them to take over the computers and steal information.

In this way, the developers could then use the infected machines as a tool to gain access to encrypted data and gain control over the affected machines.

“We found that Cryptorels is used by criminals and government agencies to steal private data from their victims,” Kasten said.

Cryptorels was also used to attack organizations by creating a backdoor in their online security software that allowed criminals to remotely access the affected computers and take control over their systems.

Kostener told ABC News the Chinese Government has used Cryptorellas since 2014, and has also used Cryptor for the past three years.

He said it is important to remember that these tools have been around for a long time and that the Chinese people have been exposed to a lot of them.

“There is a huge number of affected individuals and it is clear that the tools have already been used by many governments and militaries around the globe,” he added.

While the authors of the new paper said they have not yet seen any evidence of Cryptoring on the Chinese server, the researchers believe that this is likely because of the scale of the data stolen by Cryptorella and Cryptoreracker.

“Our initial analysis indicates that this attack is more sophisticated than we previously believed,” Kitzen said in the statement.

He said Cryptor was designed in a way to evade detection by security software, but that the malware was still being developed.

Security researcher Andrew Kostenson said that the new analysis is not proof that Cryptored is a real threat.

“I think this is a very interesting study and I think it is the first time we have seen evidence that a backdoor has been deployed in a publicly available program,” Kondeng said.

Tags:
, , ,