Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 29 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

A Visit from St. Malware

by The Gurus
December 24, 2015
in News
Share on FacebookShare on Twitter

By Fred Touchette, senior security analyst – AppRiver
 
‘Twas the night before Christmas, when all through the house
not a creature was stirring, not even a mouse.
But a laptop was open, the network logged on,
and unfortunately for its owner, his security had gone.
Unbeknownst to our user, and all others that care,
this laptop had malware it wanted to share.
It flew over wi-fi, pushed out through the router,
and started its journey, from computer to computer.
The owner worked, for a big corporate bank,
who relied on protection to shield it from pranks.
Had the virus arrived at the enterprises door,
it’s journey would be halted, and it would have infected no more.
But unluckily this story, has no happy ending,
for the virus was clever in seeking out glory.
Instead of the front door, it sneaked round the back,
climbed in through a gateway, that had already been hacked!
Now the organisation’s CISO was snug in his home,
blissfully unaware of what had gone on.
While he dreamed of presents, turkey and stuffing,
the virus had unleashed one great big fat Trojan
“Now Mac.Backdoor.iWorm! Now CryptoWall!
Now, GameoverZeus and Stuxnet!
On, Ice IX! On, SpyEye!
On, Torpig and Carberp!
Slide through the ethers!
And infect one and all!
Now cash away! Cash away!
Cash away all!”
While networks lay slumbering, unaware of the risk,
the code was changed slightly, so nothing seemed to be amiss.
But of course, being Christmas, someone would get a surprise
But only if they looked hard, at the damage inside.
No account would be breached,
no coins would be pilfered.
Instead, far more damaging,
credentials were taken.
Sat at home, at his desk, dressed in furs black as ink
The code writer sat, and prepared for a stint.
Lights blinked, alarms sounded, and cogs started whirring,
as over the sky came information, unending.
The credentials arrived first, number one on his list,
then came account details with how much sat in each.
From here what was required, was dexterity, and more
complicated coding to slip through the door.
Back in the bank, not an alarm had he tripped,
so the next stage of his plan he gleefully unleashed.
The Trojan allowed him to travel back in,
to the heart of the building, to plunder within.
The money, he’d steal, from accounts big and small.
He’d hide each transaction, no suspicion would fall.
Once everything was set, with no stone left unturned,
He could slip in and out, as and when, at his will.
Back at his desk programming and streaming,
he worked hard to ensure his code was unrevealing.
He wiped, and he cleaned, he scoured and he scrubbed.
He obscured the Trojan, it was as if he’d worn gloves,
He sat back from his screen, and gave a strange giggle,
And the tunnel he’d created, it dimmed and it dwindled.
But I heard him exclaim, as he spun out of sight,
“Happy Christmas to all, and to all a good night!”

FacebookTweetLinkedIn
Tags: accountsAppRiverBankBreachcarberpcashChristmasCISOCredentialsdetailsEncryptionexfiltrationfred touchettegameoverHackhackingice ixinfectionLaptoplogged onMalwareNetworkprivacySpyEyeStuxnettorpigTrojanUserWi-FiZeus
ShareTweetShare
Previous Post

NSA aided GCHQ in finding holes in Juniper products

Next Post

BlackEnergy APT Sabotages Ukrainian News Outlets and Power Stations

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information