Hackers hit with malware-ridden tools

Researchers uncover campaign targeting other hackers and the networks they've accessed

Security researchers have discovered a campaign where hackers themselves have become targets with malware-ridden tools offered online.

These tools enable an attacker to take full access of a victim's computer once unwittingly opened, according to Amit Serper from Cybereason

Serper has been investigating a campaign that's been running for years and found that hackers were taking existing tools and injecting them with remote-access trojan malware.

Related Resource

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Some of the tools were designed to harvest data through via product key generators. 

These were being repackaged and placed online, on forums and websites, to 'bait' other hackers in the hope that once in their systems, they would find backdoors into the networks they had hacked themselves. 

The tools have been infected with njRat, a new strain of trojan which gives the attacker full access to the victim's computer, their files, passwords and even their webcam and microphone. 

The njRat trojan is often spread through phishing emails and infected flash drives, but according to Serper, the malware has been embedded on to dormant or insecure websites. According to his research, these hackers have compromised several websites and are building new variations of the tools on a daily basis.

While hackers getting hacked may sound like a comeuppance, it's most likely fueling more criminal activity, according to Jake Moore, cyber security specialist at ESET. He suggests this could easily spread to a wider audience than just those intended. 

"Once campaigns like this are released into the wild, they inevitably end up being used by other threat actors, which increases the number of targets on a wider scale," he said. 

"Whilst the actors behind these campaigns may not be thinking about how moral such activities are, it highlights that even criminal hackers are susceptible to foul play and are vulnerable to impressive attacks."

Featured Resources

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Free download

The IT expert’s guide to AI and content management

How artificial intelligence and machine learning could be critical to your business

Free download

The path to CX excellence

Four stages to thrive in the experience economy

Free download

Becoming an experience-based business

Your blueprint for a strong digital foundation

Free download

Recommended

New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021

Most Popular

What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Apple patches zero-day flaw abused by infamous NSO exploit
exploits

Apple patches zero-day flaw abused by infamous NSO exploit

14 Sep 2021
Google takes down map showing homes of 111,000 Guntrader customers
data breaches

Google takes down map showing homes of 111,000 Guntrader customers

2 Sep 2021