Jamaica Finance

Oct 1 2017

New Shodan Tool Can Find Malware Command and Control (C ?>

#

Google Algorithm Removes Watermarks From Stock Photos

  • Secret Chips Can Be Hidden in Replacement Parts to Spy and Take Over Smartphones

  • Couple Accused of Using Lowes Website Flaw to Steal Expensive Goods

  • The Week in Ransomware – August 18th 2017 – SyncCrypt, GlobeImposter, & Locky

    Chrome Adds Warning for When Extensions Take Over Your Internet Connection

  • Oracle Wants to Give Java EE to the Open-Source Community

  • Couple Accused of Using Lowes Website Flaw to Steal Expensive Goods

  • Google Algorithm Removes Watermarks From Stock Photos

  • Process Monitor (ProcMon)

  • Junkware Removal Tool

    Locky Ransomware Information, Help Guide, and FAQ

  • Remove the Intel and IntelService.exe CryptoCurrency Miner

  • Remove the Go.querymo.com Search Redirect

  • Remove the Privacy Search Plus & Search.privacy-search.net Extension

    Remove Security Tool and SecurityTool (Uninstall Guide)

  • How to remove Antivirus 2009 (Uninstall Instructions)

  • How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo

  • How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller

    Locky Ransomware Information, Help Guide, and FAQ

  • CryptoLocker Ransomware Information Guide and FAQ

    CryptorBit and HowDecrypt Information Guide and FAQ

  • CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ

    How to Remove a Button from the Firefox Menu

  • How to Add a Button to the Firefox Menu

  • How to Add a Button to the Firefox Toolbar

  • How to Remove a Button from the Firefox Toolbar

    How to start Windows in Safe Mode

  • How to remove a Trojan, Virus, Worm, or other Malware

  • How to show hidden files in Windows 7

  • How to see hidden files in Windows

  • IT Certification Courses

  • Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C C) servers. Named Malware Hunter. this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices.

    Malware Hunter works via search bots that crawl the Internet looking for computers configured to function as a botnet C C server.

    In order to trick a C C server to reveal its location, the search bot uses various predefined requests to pretend to be infected computer that s reporting back to the C C server. If the scanned computer responds, Malware Hunter logs the IP and makes it available via the Shodan interface.

    Malware Hunter is powered by technologies from Shodan and Recorded Future. For its part, Shodan is providing the ability to quickly and efficiently probe every IP address on the Internet, while Recorded Future is contributing the technical information needed to mimic infected computers (malware bots).

    This methodology is the first to use Shodan to locate RAT controllers before the malware samples are found, said Levi Gundert, vice president of intelligence and strategy at Recorded Future. By doing it this way – signature scans for RAT controller IP addresses, observing malware through our API, and cross-correlating it with a variety of sources – we are able to locate RAT controllers before the associated malware begins spreading or compromising targeted victims.

    More details about the technical details behind the process of searching and identifying C C servers is available in this 15-page report released by Recorded Future.

    Currently, Malware Hunter can identify a wide range of RAT C Cs

    Currently, the Malware Hunter engine comes with support for identifying a wide range of C C servers for RATs (Remote Access Trojans), such as Dark Comet, njRAT, Poison Ivy, Ghost RAT, and more.

    In the future, hopes are that the Malware Hunter search engine will be able to uncover other types of malware botnets, such as those for backdoor trojans, cyber-espionage malware, cryptominers, or DDoS malware.

    You can directly access Malware Hunter results by searching for category:malware on Shodan. An initial set of results at the time of writing lists over 5,700 C C servers.


  • Written by admin


    Leave a Reply

    Your email address will not be published. Required fields are marked *