HomeRisk ManagementsInfostealers are using BYOVD to steal critical system data

Infostealers are using BYOVD to steal critical system data

Published on

spot_img

A recent cybersecurity incident involving Foxit PDF software has raised concerns as the promised functionality of a cracked version included sophisticated malware that targeted users’ computers. The malicious software, known as SteelFox, exploited vulnerabilities in the software’s installation process to gain administrator access and carry out malicious activities.

The malware was delivered through a cracked version of Foxit PDF software, which was distributed online with the promise of enabling piracy. However, what users did not realize was that the cracked software also contained malicious code that could compromise their systems. Once installed, the cracked version of Foxit PDF asked for administrator access, which was later exploited by the malware for its malicious purposes.

According to cybersecurity experts at Kaspersky, the malware was designed to escalate privileges through a vulnerable driver in the legitimate-looking execution chain. This allowed the malicious files to be unpacked and the SteelFox malware to be dropped onto the victim’s machine. Once installed, SteelFox had the ability to collect sensitive information from the victim’s browser, including cookies, credit card data, browsing history, and software details such as installed software, antivirus solutions, running services, and installed add-ons.

The presence of such sophisticated malware in a cracked version of a popular software like Foxit PDF highlights the risks associated with downloading and using pirated software. In addition to violating copyright laws, users who engage in software piracy also expose themselves to potential security threats. Cybercriminals often capitalize on the popularity of cracked software to distribute malware and carry out malicious activities.

To protect themselves from such threats, cybersecurity experts advise users to only download software from official sources and avoid using cracked versions of applications. By obtaining software from legitimate sources, users can ensure that they are not inadvertently exposing themselves to malware and other security risks. Additionally, it is important for users to keep their software up to date and install security patches as soon as they are available to prevent exploitation of known vulnerabilities.

In the case of the Foxit PDF software incident, the discovery of the SteelFox malware serves as a reminder of the importance of cybersecurity vigilance. As cyber threats continue to evolve and become more sophisticated, it is crucial for users to stay informed about potential risks and take proactive measures to protect their data and devices. By practicing safe computing habits and exercising caution when downloading software, users can reduce the likelihood of falling victim to malware and other cyber attacks.

Source link

Latest articles

Symbiotic Security Introduces Scanning Tool for Code Flaw Remediation

The idea of shifting security left in the software development process, integrating it earlier...

Kolkata and State Police Recover Over Rs 1 Crore in Cyber Fraud Operations

In a commendable display of swift action and efficiency, the Kolkata Police and Bengal...

Rising Cyber Risks for Government Agencies: The Ongoing Struggle with Security

Government and education organizations, collectively referred to as SLED, have always been vulnerable to...

The Secret Surveillance Abilities Of Smart Appliances

A recent investigation conducted by the consumer advocacy group Which? has exposed a troubling...

More like this

Symbiotic Security Introduces Scanning Tool for Code Flaw Remediation

The idea of shifting security left in the software development process, integrating it earlier...

Kolkata and State Police Recover Over Rs 1 Crore in Cyber Fraud Operations

In a commendable display of swift action and efficiency, the Kolkata Police and Bengal...

Rising Cyber Risks for Government Agencies: The Ongoing Struggle with Security

Government and education organizations, collectively referred to as SLED, have always been vulnerable to...
en_USEnglish