Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Researchers warn of "disappearing malware"

by The Gurus
April 1, 2015
in Top 10 Stories
Share on FacebookShare on Twitter

“Disappearing malware” has been detected by researchers from ESKNZ Security, which affects computers physically.
 
Researchers believe cyber criminals are using this to target computers at banks, global enterprises and Governments. Unlike other security threats, the ‘disappearing malware’ puts a virtual cloak on machines which then renders them completely invisible to the human eye.
 
It is believed cyber criminals are targeting their victims via phishing scams and, once their target clicks on the malicious email link, their computer literally disappears before their eyes. Under this shroud, an invisible gateway is opened at the back of the machine allowing a Trojan horse, also invisible to the naked eye, to enter the shielded machine.
 
Once inside it snoops about collecting files that can be used by its controllers before galloping back along the cables and leaving the door unbolted. Experts from some of the world’s leading security vendors have been left shocked by this discovery, with many saying the ‘disappearing malware’ will change the cyber world in ways previously never thought possible.
 
Mike Spykerman, vice president of product management at OPSWAT, said: “This attack brings malware to a whole different level. Until now it was believed that the invisible computer gateway was impossible to open and that only harmless Trojan ponies could be used. The fact that these attackers are now using horses is a truly ominous sign that we are facing an extremely sophisticated and dangerous opponent.”
 
TK Keanini, CTO of Lancope, said: “We believe that this capability has either Klingon or Romulan origins.  The exact same toolkit used by Harry Potters ‘The Internet’ connects everything, and everyone and it was only a matter of time before we are dealing with an interplanetary threat.”
 
Amichai Shulman, CTO of Imperva, said: “I think that this threat shows how advanced hackers have become, by being able to harness techniques of quantum computing, they have been able to create the necessary worm holes that take computers into a different dimension.”
 
However Kevin Epstein, VP of advanced security and governance at Proofpoint, said that there is a possibility that this report may be a hoax, as its best researchers viewed a lab of supposedly infected machines, and couldn’t see traces of anything; malware, keyboards, even cables. “It’s like we were looking at an empty room,” he said.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Palo Alto Networks and VMware extend partnership to protect mobile

Next Post

Industry should come together to defend against DDoS – comments

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information