Add. Malicious functionality

Connect Asia Data learn, and optimize business database management.
Post Reply
Mitu100@
Posts: 1593
Joined: Tue Jan 07, 2025 4:29 am

Add. Malicious functionality

Post by Mitu100@ »

Rootkits are a set of tools that provide: masking, management and data collection. These utilities are installed by the hacker as soon as he gets administrator rights, this set includes various programs that help to cover up any user actions, as well as the very presence of a rootkit in the system. A rootkit can be installed into the system in various ways, but the main one is downloading an exploit or getting shell access.
Rootkits are divided by the level of action and privileges, and the main type of implementation in Windows is interception of call tables/functions, etc. Implementation in Linux – substitution of the main system utilities, modification of the physical memory of the kernel, etc.

Backdoors - Allows a hacker to gain remote access to files and control of the OS system itself. Backdoors can be installed in various ways: downloading programs, photos, and there are also phone number list hardware backdoors. Their very function is that at any moment an attacker can gain access to your files, OS or something else, and the backdoors themselves can be registered as an error in the program code, which is why the developer of this program can say that he did not know about this function and will fix it in the next update, but before that your computer will be available to the hacker. Sometimes even deleting the program itself, because of which you have a backdoor installed, does not help to get rid of it.

Spies – This type of program is dangerous because it collects and sends information to an attacker without the user's consent.

Miners – This type of virus appeared not so long ago, but it is very dangerous. Thanks to these viruses, the computer's performance will fall because it will use all available resources to extract crypto currency. This type of virus can work on different devices: PC, phone, tablets, etc. The miner virus can heat/overheat computer resources, which will cause them to fail faster, and any user can become a victim of this virus.

Botnets are a computer network consisting of the nth number of hosts with bots that allows an attacker to use the resources of the user's computer/network to send spam messages or receive data, as well as Ddos attacks or brute force passwords. By the way mivocloud.com provides protection against Ddos attacks and Spam protection.
Post Reply