• 9964432222
  • Mail Us
  • Appointment
  • Locate Us
  • Chat Now
  • Courses
  • Login
  • Register
Manifest IAS
JournalsOfIndia
Advertisement
  • Home
  • SNIPPETSfor Prelims
  • ARTICLESfor Mains
  • BROWSEBY SOURCE
  • DOWNLOADS
No Result
View All Result
  • Home
  • SNIPPETSfor Prelims
  • ARTICLESfor Mains
  • BROWSEBY SOURCE
  • DOWNLOADS
No Result
View All Result
JournalsOfIndia
No Result
View All Result
Home Security

NetWire

February 16, 2021
in Security
Reading Time: 2min read
0
NetWire

Antivirus symbol on binary background with digital worm ban. Abstract 3D illustration of cyber protection icon.

59
VIEWS
Share on WhatsAppShare on TelegramShare on Facebook

In news: NetWire was in news with respect Elgar Parishad case accused Rona Wilson(installation of the NetWire remote access Trojan (“RAT”) on Wilson’s computer)

About the NetWire

  • It is a remote access Trojan focused on password stealing and keylogging, as well as including remote control capabilities.
  • It  has been used by malicious groups since 2012 and distributed through various social engineering campaigns (malspam)
  • This multi-platform malware has since undergone several upgrades and was identified in different types of attacks that range from Nigerian scammers to advanced persistent threat (APT) attacks.
  • As per the experts, NetWire RAT has been observed during 2020 as one of the most active botnets.
  • The threat spreads essentially through COVID-19 themed attacks
  • This malware was one of the malware families most exploited in COVID-19 phishing campaigns between February and April 2020.

How does it work?

  • Nowadays, NetWire is often launched via social engineering campaigns or as a later payload of another malware chain. 
  • Criminals send emails with malicious files attached to a wide number of users and expect at least someone to open the infected file. 
  • Once a victim clicks on it, the malware file is downloaded onto the victim’s computer. 
  • The shared files often used by crooks are PDF, Word and IMG files
  • As a result, after clicking on the shared URL, the next stage is downloaded onto the victim’s computer
  • After being executed on the victim’s side, several anti-analysis techniques to protect it from being analyzed are executed. 
  • It dynamically extracts the malicious code into the memory and executes it in order to bypass Antivirus detection.

Malware families most actively exploited COVID-19 phishing campaigns are:

AngentTesta, Netwire, LokiBot, HawkEye, Aurora, Hakbit, Form Book

What is Phishing?

It is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Source: Times of India
Tags: News PaperPrelims

Related Posts

Cyber Insurance Policy

Cyber Insurance Policy

February 24, 2021
Anti-Tank Guided Missile Systems ‘Helina’ and ‘Dhruvastra’

Anti-Tank Guided Missile Systems ‘Helina’ and ‘Dhruvastra’

February 20, 2021
Multi-Domain Operations

Multi-Domain Operations

February 12, 2021
Theatre Level Operational Readiness Exercise (TROPEX 21)

Theatre Level Operational Readiness Exercise (TROPEX 21)

February 11, 2021
Smart Wall for Indian Borders

Smart Wall for Indian Borders

February 10, 2021
Digital Sky Platform

Digital Sky Platform

February 9, 2021
Indo Tibetan Border Police(ITBP)

Indo Tibetan Border Police(ITBP)

February 8, 2021
Anti-Access Area Denial Capabilities

Anti-Access Area Denial Capabilities

February 4, 2021
Integrated Weapons System Design Centre

Integrated Weapons System Design Centre

January 28, 2021
Mukti Bahini

Mukti Bahini

January 27, 2021
Please login to join discussion
February 2021
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
« Jan    

Browse by Category

  • Agriculture
  • Disaster Management
  • Economy
  • Environment
  • Ethics
  • Foreign Affairs
  • Geography
  • Governance
  • History
  • Law & Policy
  • Opinion
  • People in News
  • Places in News
  • Science & Tech
  • Security
  • Society

Browse by Tags

AIR Down to Earth EU g20.utoronto.ca GS-1 GS-2 GS-3 GS-4 imi3.nhp.gov.in Kurukshetra Mains News Paper PIB powergridindia.com Prelims RSTV Science Reporter Survey Yojana Zee news
JournalsOfIndia

Our vision is to orient the readers to grasp the facts objectively and analyse critically. In the rush of reaching first to the readers, the websites miss the balanced opinion, which is the need of the hour. We aim to reach the readers with more crispness, preciseness and relevance. We bring the articles in UPSC way for the civil services aspirants and the Wisest Way for general readers.

Categories

  • Agriculture
  • Disaster Management
  • Economy
  • Environment
  • Ethics
  • Foreign Affairs
  • Geography
  • Governance
  • History
  • Law & Policy
  • Opinion
  • People in News
  • Places in News
  • Science & Tech
  • Security
  • Society

Browse by Tag

AIR Down to Earth EU g20.utoronto.ca GS-1 GS-2 GS-3 GS-4 imi3.nhp.gov.in Kurukshetra Mains News Paper PIB powergridindia.com Prelims RSTV Science Reporter Survey Yojana Zee news

Newsletter

The most important UPSC news and events of the day.

Get Journals daily newsletter on your inbox.

© 2020 JournalsOfIndia - A free initiative by Manifest Team.

  • Login
  • Sign Up
  • Home
  • SNIPPETS
  • ARTICLES
  • BROWSE
  • DOWNLOADS
No Result
View All Result

© 2020 JournalsOfIndia - A free initiative by Manifest Team.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In