Hackers hit with malware-ridden tools
Researchers uncover campaign targeting other hackers and the networks they've accessed
These tools enable an attacker to take full access of a victim's computer once unwittingly opened, according to Amit Serper from Cybereason.
Serper has been investigating a campaign that's been running for years and found that hackers were taking existing tools and injecting them with remote-access trojan malware.
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Some of the tools were designed to harvest data through via product key generators.
These were being repackaged and placed online, on forums and websites, to 'bait' other hackers in the hope that once in their systems, they would find backdoors into the networks they had hacked themselves.
The tools have been infected with njRat, a new strain of trojan which gives the attacker full access to the victim's computer, their files, passwords and even their webcam and microphone.
The njRat trojan is often spread through phishing emails and infected flash drives, but according to Serper, the malware has been embedded on to dormant or insecure websites. According to his research, these hackers have compromised several websites and are building new variations of the tools on a daily basis.
While hackers getting hacked may sound like a comeuppance, it's most likely fueling more criminal activity, according to Jake Moore, cyber security specialist at ESET. He suggests this could easily spread to a wider audience than just those intended.
"Once campaigns like this are released into the wild, they inevitably end up being used by other threat actors, which increases the number of targets on a wider scale," he said.
"Whilst the actors behind these campaigns may not be thinking about how moral such activities are, it highlights that even criminal hackers are susceptible to foul play and are vulnerable to impressive attacks."
Consumer choice and the payment experience
A software provider's guide to getting, growing, and keeping customersDownload now
Prevent fraud and phishing attacks with DMARC
How to use domain-based message authentication, reporting, and conformance for email securityDownload now
Business in the new economy landscape
How we coped with 2020 and looking ahead to a brighter 2021Download now
How to increase cyber resilience within your organisation
Cyber resilience for dummiesDownload now