Post by account_disabled on Feb 28, 2024 2:32:33 GMT -5
It is a threat that is causing great alert due to its potential to damage and affect government entities. Below, we guide you about this malware, its characteristics, how to avoid it and some cases of organizations whose systems have been affected by this virus. What is XMKR Malware ? Malware is dangerous software developed with the aim of damaging a computer or information system by infiltrating its files without consent . This term describes any fragment of malicious code with the ability to : Steal or encrypt data. Alter or hijack basic functions of the computer or device.
Access computer systems. without the user's permission. Encrypt data. Send spam messages . Generate an overload on the bandwidth of a network in order to collapse it. Serve as a channel to List Of US Mobile Number List other harmful programs. Destroy files and data. Malware code includes several subcategories that infect or corrupt files and programs in different ways: Worms. Virus. Trojans. Spyware. Adware. Ransomware. Botnets. Malware that targets government entities The XMKR malware is based on the contamination of USB flash drives ,compromising their security and that of the computers on which they are used. In this sense, the company specialized in cybersecurity Kaspersky has warned of this APT or Advanced Persistent Threats type threat, where a range of advanced techniques are used to put information at risk and steal.
Source: Envato Government systems under attack by XMKR Malware For example, the use of malware with the malicious behavior of XMKR is its propagation under the name “TetrisPhantom”. In this case, harmful software is aimed at affecting government entities in the Asia-Pacific region (APAC). This is a cyber attack campaign with global reach deployed to put governments and their management entities at risk. It seeks to take advantage of vulnerabilities: infect an encrypted USB drive. The strategy is to take advantage of the USBs that are considered secure and that are used in entities and computer systems in the government sector as a vector.
Access computer systems. without the user's permission. Encrypt data. Send spam messages . Generate an overload on the bandwidth of a network in order to collapse it. Serve as a channel to List Of US Mobile Number List other harmful programs. Destroy files and data. Malware code includes several subcategories that infect or corrupt files and programs in different ways: Worms. Virus. Trojans. Spyware. Adware. Ransomware. Botnets. Malware that targets government entities The XMKR malware is based on the contamination of USB flash drives ,compromising their security and that of the computers on which they are used. In this sense, the company specialized in cybersecurity Kaspersky has warned of this APT or Advanced Persistent Threats type threat, where a range of advanced techniques are used to put information at risk and steal.
Source: Envato Government systems under attack by XMKR Malware For example, the use of malware with the malicious behavior of XMKR is its propagation under the name “TetrisPhantom”. In this case, harmful software is aimed at affecting government entities in the Asia-Pacific region (APAC). This is a cyber attack campaign with global reach deployed to put governments and their management entities at risk. It seeks to take advantage of vulnerabilities: infect an encrypted USB drive. The strategy is to take advantage of the USBs that are considered secure and that are used in entities and computer systems in the government sector as a vector.