Skip to main content

DarkComet Trojan virus, Remote Access Trojan (RAT) attack on Macintosh

Message from Trojan (RAT). If you see below message in your system you are infected
Hello I'm the BlackHole Remote Administration Tool. I'm a trojan horse, so I have infected your Mac Computer. I know, most people think that Macs can't be infected, but look, you ARE infected! I have full controll [sic] over your Computer and I can do everything I want, and you can do nothing to prevent it. So, Im [sic] a very new virus, under Development, so there will be much more functions when I'm finished. But for now, it's okay what I can do. To show you what I can do, I will reboot your Computer after you have clicked the Button right down.
BlackHole RAT


Appears to be a mix of German and English in the user interface. Its functions include:

  •  Placing text files on the desktop
  •  Sending a restart, shutdown or sleep command
  •  Running arbitrary shell commands
  •  Placing a full screen window with a message that only allows you to click reboot
  •  Sending URLs to the client to open a website
  • Popping up a fake "Administrator Password" window to phish the target
get video of this http://youtu.be/ge67SuW1GvU

Download Antivirus here




Popular posts from this blog

The possibility of quantum computing breaking encryption algorithms

The possibility of breaking encryption algorithms is a powerful motivating factor for many countries of the world. Thus, knowledge of the enemy's encryption systems could give a huge advantage in intelligence, while at the same time contributing to the conduct of new fundamental research in the field of physics, since modern experimental systems have at their disposal only less than 100 qubits.    To achieve the useful computing performance of a supercomputer, we probably need machines with hundreds of thousands of qubits. In order for the devices to function correctly, they must correct all minor random errors in the software. In a quantum computer, such errors arise due to imperfect elements of the circuit and the interaction of qubits with their environment. For these reasons, qubits can lose coherence in literally a split second. A quantum computer with 100 qubits can simultaneously represent 2100 solutions. For some tasks, this exponential parallelism can be used to create a h

How to install cloudflare wrap on linux

 command mode dumb......expert user edition   millen@TechGlyphs-Studio:~/Desktop$ wrap-cli wrap-cli: command not found millen@TechGlyphs-Studio:~/Desktop$ curl https://pkg.cloudflareclient.com/pubkey.gpg | sudo gpg --yes --dearmor --output /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg Command 'curl' not found, but can be installed with: sudo snap install curl  # version 7.86.0, or sudo apt  install curl  # version 7.81.0-1ubuntu1.6 See 'snap info curl' for additional versions. [sudo] password for millen:  gpg: no valid OpenPGP data found. millen@TechGlyphs-Studio:~/Desktop$ sudo apt  install curl Reading package lists... Done Building dependency tree... Done Reading state information... Done The following packages were automatically installed and are no longer required:   chromium-codecs-ffmpeg-extra gstreamer1.0-vaapi libflashrom1 libftdi1-2   libgstreamer-plugins-bad1.0-0 Use 'sudo apt autoremove' to remove them. The following NEW packages will be in

Simple steps to protect your privacy.

  Step 1. Download DuckDuckGo on all your devices With just one download you'll get tracker blocking, private searching, increased encrypting, and privacy grading on all of your browsing. Our mobile app for iOS/Android (DuckDuckGo Privacy Browser) and browser extensions for Firefox, Chrome, and Safari (DuckDuckGo Privacy Essentials) has all of this in one seamless package. Privacy, simplified. Step 2. Update your software Your device operating systems get out-of-date over time, and old software can contain security bugs or settings that leak personal data. Set your devices (and the apps on them) them to update automatically. That way you'll always have the latest, safest versions. Step 3. Update your privacy settings Make sure your devices are using the best privacy settings. Here are step-by-step instructions for all the major device types. Especially make sure you adjust per-app location settings, so that your location history isn’t leaking where it shouldn’t. For extra bonus