How Hackers inject malware without Any Notice? Cyber security Blogs

How Hackers inject malware without Any Notice?

Special Blog
Thank You so Much Guys for your so Love ||
snapshot
There is A GOOD NEWS ||


I have been Selected in TOP 200 Technology Blogs in 2019


Please do checkout link of Top 200 technology blogs of 2019.


Top 200 Technology Blogs of 2019



And in My Birth Month YO.

SO 

TODAYS BLOG IS  AS YOU HAVE SEEN THE TITLE ABOVE.

First thing first 
ftf⇃⇂

What is A Malware ? Or Rat / Virus / Trojan ? 

Malware is that the overarching name for applications and different code, like software package, that Microsoft classifies additional granularly as malicious software package or unwanted software package.

Malicious software package
Malicious software package is Associate in Nursing application or code that compromises user security. Malicious software package could steal your personal info, lock your device till you pay a ransom, use your device to send spam, or transfer different malicious software package. In general, malicious software package desires to trick, cheat, or defrauds users, putting them in vulnerable states.

Microsoft classifies most malicious software package into one amongst the subsequent categories:
Backdoor: a kind of malware that provides malicious hackers remote access to and management of your device.

Downloader: a kind of malware that downloads different malware onto your device. It should connect with the web to transfer files.

Droppera kind of malware that installs different malware files onto your device. in contrast to a downloader, a eye dropper doesn’t got to connect with the web to drop malicious files. The born files ar usually embedded within the eye dropper itself.

Exploit: a bit of code that uses software package vulnerabilities to realize access to your device and perform different tasks, like putting in malware.
Hacktool: a kind of tool that may be wont to gain unauthorized access to your device.

Macro virusa kind of malware that spreads through infected documents, like Microsoft Word or stand out documents. The virus is run once you opeAssociate in Nursing infected document.

Obfuscatora kind of malware that hides its code and purpose, creating it harder for security software package to sight or take away.

Password stealera kind of malware that gathers your personal infolike user names and passwords. It typically works in conjunction with a keylogger, that collects and sends info concerning the keys you press and websites you visit.

Ransomware: a kind of malware that encrypts your files or makes different modifications that may forestall you from victimization your device. It then displays a ransom note that states you need to pay cash, complete surveys, or perform different actions before you'll be able to use your device once more.

Rogue security software package: Malware that pretends to be security software however does not offer any protection. this sort of malware sometimes displays alerts concerning nonexistent threats on your device. It additionally tries to win over you to get hold of its services.

Trojana kind of malware that makes an attempt to look harmless. in contrast to a scourge or a worm, a trojan does not unfold by itself. Instead, it tries to appear legitimate and tricks users into downloading and putting in it. Once put in, trojans perform numerous malicious activities like stealing personal info, downloading different malware, or giving attackers access to your device.

Trojan clicker: a kind of trojan that mechanically clicks buttons or similar controls on websites or applications. Attackers will use this trojan to click on on-line advertisements. These clicks will skew on-line polls or different pursuit systems and might even install applications on your device.

Worm: a kind of malware that spreads to different devices. Worms will unfold through email, instant electronic messaging, file sharing platforms, social networks, network shares, and removable drives. subtle worms profit of software package vulnerabilities to propagate.




#SOME BAD AND DANGEROUS MALWARE NAMES ?


Describes what the malware will on your laptop. Worms, viruses, trojans, backdoors, and ransomware square measure a number of the foremost common forms of malware.
AdwareBackdoorBehaviorBrowserModifierConstructorDDoSExploitHacktoolJokeMisleadingMonitoringToolProgramPWSRansomwareRemoteAccessRogueSettingsModifierSoftwareBundlerSpammerSpooferSpywareToolTrojanTrojanClickerTrojanDownloaderTrojanNotifierTrojanProxyTrojanSpyVirToolVirusWorm


WHAT SCRIPTING LANGUAGE DOES IT USE TO MAKE A MALWARE OR VIRUS ?

Scripting languages


ABAP: Advanced Business Application Programming scriptsALisp: ALisp scriptsAmiPro: AmiPro scriptANSI: yankee National Standards Institute scriptsAppleScript: compiled Apple scriptsASP: Active Server Pages scriptsAutoIt: AutoIT scriptsBAS: Basic scriptsBAT: Basic scriptsCorelScript: Corelscript scriptsHTA: HTML Application scriptsHTML: HTML Application scriptsINF: Install scriptsIRC: mIRC/pIRC scriptsJava: Java binaries (classes)JS: Javascript scriptsLOGO: emblem scriptsMPB: MapBasic scriptsMSH: Monad shell scriptsMSIL: .Net intermediate language scriptsPerl: Perl scriptsPHP: machine-readable text Preprocessor scriptsPython: Python scriptsSAP: SAP platform scriptsSH: Shell scriptsVBA: Visual Basic for Applications scriptsVBS: Visual Basic scriptsWinBAT: Winbatch scriptsWinHlp: Windows facilitate scriptsWinREG: Windows written account scripts


$WHAT ARE THE TECHNIQUES THAT HACKERS USED TO HIDE MALWARE ? 


1. MS OFFICE FILE SYSTEM   - 

MACRO THING IN WORD AND PPT FILES AND ALSO EXCEL FILES : -
malware injection system
word macro

.Macro malwareHow macro malwa↓re works:-

Macro malware hides in Microsoft workplace files and square measure delivered as email attachments or within nothing files. These files use names that square measure meant to tempt or scare folks into gap them. They usually seem like invoices, receipts, legal documents, and more.

Macro malware was fairly common many years agone as a result of macros ran mechanically whenever a document was opened. 


However, in recent versions of Microsoft workplace, macros square measure disabled by default. this suggests malware authors have to be compelled to convert users to show on macros in order that their malware will run. 

they are doing this by showing pretend warnings once a malicious document is opened.

*****************************************************************


Malware and virus etc are can also be hidden in Photo files like Jpeg and png etc and 

also RAT Which is Remote access trojans are likely almost injected by these techniques : - 

Photo trojans 
apk trojans 
video trojan
file trojan
message trojan 

UNDETECTABLE BACKDOOR OR TROJAAN :-

HOW TO HIDE ?

Only  1 platform 

Kali linux : Operating system for Hackers.
security hackers os
kali

By this we can Actually hide our malware or backdoor 

software in an normal photo file or word file etc.


1. By Msfvenom Tool which is also called Metasploit tool .


how to bind payload virus to a picture jpg breed blip has the flexibility to produce AN workable payload this may

be very helpful if you'll get a  target machine to run the workable  attackers typically use social engineering  phishing and alternative attacks to induce a  victim to run a payload  if attackers will get there the victim to  run a payload there's no reason for AN  attacker to search out and exploit vulnerable  software.



I will not Go deep in this Blog. Next Blog can be more interested if this will the Topic.


Bloggger
Blogger

SO IF YOU
LIKE MY BLOG , THEN DO'NT FORGET TO HIT THE LIKE BUTTON OF FACEBOOK FAN PAGE AND ALSO FOLLOW ON MY INSTAGRAM  ID.




Thank you very much for Reading till last this blog ! Too much Appreciation and please let me by Comment Below Please Do follow Facebook page and twitter :)

COMMENTS

BLOGGER: 1
Loading...
Name

100Gbps,1,1337x.st,1,2019,1,550000 $,2,7 signs,1,a blogger is always a blogger,1,adsense,1,an anonymous girl,2,Android phone,1,Android smartphone lock,6,Android Update,1,ankit faida fake hacker,3,anonymous,4,anonymous email,4,anonymous group,1,anonymous hackers,6,anonymous online,3,antivirus,2,authentication,2,Backlink,4,Banking Trojan,2,Black hat hackers,3,BLACK HAT HACKING 4,1,Black Hat Hacking 6,1,Black market,2,Black-Hat Hacking,6,Blog,9,Blogger,3,blogging,2,Blogspot,7,CAA,1,CAB,1,Calls Spy,5,Calls Trace,2,Camera,2,Career Path,12,CCTV,1,Chaos of computer Club,1,clickjacking attack,1,Computer,17,computer Hacking,11,Computer tricks,8,computer tricks and tips,6,Confessions,11,ConfessionsComputer,13,confessionscomputer.online,5,content,1,cyber,1,Cyber crime,24,Cyber Security,50,cyber security solutions,21,cyber security threats,2,cyber security trends,1,cyber war,1,Cyberghost,1,cybersecurity,1,Dangerous,1,dangerous hacking,4,Dangerous Risk,2,Dark-web,1,Darknet,2,Darkweb,2,Deep web,2,desktop support engineer,1,desktop troubleshooting,1,digital marketing,2,DNS,1,dns spoofing hack facebook dns spoofing fb hack dns spoofing in ethical hacking,1,Dns-spoof hack,1,Domain Name syste,1,donation,1,download tor,1,drugs,1,easiest technique,7,EC COUNCIL,1,Email,2,encryption,1,Expectations vs Reality,4,Exploiting Android smartphone,1,facebook,2,facebook accounts,6,facebook file against NSC group,1,facebook hack,5,facebook likes,1,facebook page,5,facebook phishing Attack,2,fb lite Hack,5,followes,1,fool you,6,General Ways and Most Dangerous Techniques,1,Gmai Hack,1,Gmail,1,google ads,1,Google Forum,7,Google LLC,3,google my bussiness,2,Google Rank,1,Google trends,2,guidebloggng,1,Hack,12,Hack Android Smartphone,1,Hack CCTV Camera,3,hacker,5,hacker anonymous,1,hackers,2,Hacking,8,hacking facbook,1,Hacking method,2,hacking methods,1,Hacking news,1,Hacks,2,Hard disk wiping,1,hard work,1,hardware,1,Hide Your Private file in Audio and image files,1,Hotspotshield,1,How ? Cyber Security,1,how to,8,how to blog,1,how to capture keystrokes/passwords,1,how to crack pegasus spyware,1,How to do it,2,How to Hack Bank Accounts,1,how to hack website easily,2,how to hack wifi,5,how to pegasus github,1,how to start a successfull blog,1,how to use tor,1,imprisonment,1,INCREDIBLE BLOG,6,india news,1,Instagram Followers,2,Instagram hack,3,instagram hacking easiest technique,1,internet,1,IoT Devices,1,Iphone Lock,1,It,1,it security,1,It's not hacking,1,jail,1,JARVIS,1,kali linux,1,keyword,1,keyword reasearch,1,link,1,live cam sites,1,live Security Cameras,1,live streaming cameras online,1,live web cameras around the world,1,live web cams,1,long-tail keyword,1,Low orbit ion cannon,1,lulzsec,1,make money,1,malicious link,1,Malware,4,malware attack,3,malware payload,2,malware scan,1,malware spyware,1,malware virus malware in hindi malware attack,2,Malwarebytes,1,Malwarebytes Anti-Malware,1,Man in the middle attacj,1,Man in the Middle Attack,2,MFA,2,minutes facebook accounts,3,MITM,2,Most dangerous Hack,2,Most easily,1,Most Hidden Web Search Engine,1,Multi-factor Authentication,1,Near field Communication,1,Network,1,neverquest,1,Neverquest Banking Trojan,1,new cyber security,2,NEW MALWARE,1,New tech update,1,new tik tok,1,new tiktok filter,1,NOC,1,NRC,1,onion websites,1,OSINT,1,park seo joon,1,passwords,1,pegasus github,1,pegasus spyware,2,Pen drive key,1,pendrive,1,Phishing method,2,PHONE HACK,6,phone number Hack,1,police,1,prison,1,privacy,1,program,1,proxy,2,Quiz,1,RANSOMWARE ATTACKS,1,ransomware fight,1,ransomware mitigation checklist,1,real hack series,1,Search Engine Optimisation,5,Search Engine optimization Digital Marketing course,1,secure key,1,Secure your Accounts with Hacking,1,Security,4,seo,6,SEO 2020,2,seo kang joon,1,SIM HACK,5,sim swapping,1,Social Engineering HAcking,1,social media account hacking,1,social news,1,spy,1,Spy on Phonne number,1,tech,9,technical,6,TECHNICAL BLOG,6,Technology,9,tik tok,1,title,1,TOP 7 Signs of Cyber security will be more drastic in 2020,1,tor,2,tor browser,2,torrent,1,Trace,1,Traffic,4,trends,2,twitter Hack,1,two arrested for cyber crime,1,Two-factor Authentication,2,Unknown facts,1,Unlimited,1,virus,2,voice program,1,vpn,4,Vulnerability,1,web hacking,3,Web in depth,1,web search engine,2,website hack,1,Website packets,1,website traffic so much,4,whatisseo,1,whatsapp bug,1,whatsapp hack,3,Whatsapp Hack easily,1,whatsapp web,2,wifi,3,wifi hacking,1,Wifi hackingBlog,1,Wifi Password,1,wifihack,1,wikipedia External Links,2,win 7,2,windows 10,2,Windows Password Hack : SO EASY-PEASY METHOD ? Cyber Security,1,worst cyber attack,1,Youtube video,1,Zerocleare,1,
ltr
item
Confessions of A Computer Freak: How Hackers inject malware without Any Notice? Cyber security Blogs
How Hackers inject malware without Any Notice? Cyber security Blogs
How Hackers inject malware without Any Notice?
https://1.bp.blogspot.com/-SYKi9LAsx3o/XgSttO2h-2I/AAAAAAAACoA/2g8v-rZZC80wwzeZ-Urj0OK06BUf2CKIwCLcBGAsYHQ/s1600/Capture.JPG
https://1.bp.blogspot.com/-SYKi9LAsx3o/XgSttO2h-2I/AAAAAAAACoA/2g8v-rZZC80wwzeZ-Urj0OK06BUf2CKIwCLcBGAsYHQ/s72-c/Capture.JPG
Confessions of A Computer Freak
https://www.confessionscomputer.online/2019/12/how-hackers-inject-malware-without-any.html
https://www.confessionscomputer.online/
https://www.confessionscomputer.online/
https://www.confessionscomputer.online/2019/12/how-hackers-inject-malware-without-any.html
true
7626459807492752429
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy