Skip to main content

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

 

.

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

The TrickBot is a modular banking Trojan, which can infect the Bios-drivers of the system. The TrickBot is complicated malware, which is forming by the modules. And that thing is making that malware a very powerful tool. cisecurity.org claims that TrickBot cal also drops the other malicious software to the computer, and it means that this kind of thing is the new type of Trojan.

The modular structure means that the virus can slip into the internet the module to module, which makes the firewall very hard to detect. The single modules can be innocent code, but when modules are connected. This thing can be forming very complicated computer viruses that can use artificial intelligence modules. The complicated data viruses are meant rather for spying on the system than causing destruction.

In that case, the artificial intelligence searches the necessary data from the targeted system and sends that those bits to hackers. Those artificial intelligence-based systems can search for words like "secret", "confidential" and other things like GPS. And they can slip that data away from the system in the mode, where it's hard to detect.

That means the computer virus can encrypt the data by multiplying the ASCII-codes with some base- or regular numbers. Because that thing happens before the firewall, there is the possibility that the firewall cannot detect that highly classified data is delivering out of the system.

The modular structure means that there might be many groups of hackers or developers in this kind of thing. The thing is that the virus scanners can use for bad purposes. The computer can infect in purpose and then the virus code can isolate from the infected computers. Then the hackers can make their modifications to the code. And the modular structure makes that kind of virus algorithm a very flexible tool. The hackers can involve and remove the code modules that are like books in the library to that virus.

But the new type of viruses is more advanced. The artificial intelligence-based computer viruses can infect many computers, and form the invisible bot-network. When the computer viruses are attacking against the targeted systems, the artificial intelligence-based independently operating bot-network an attack against the system by selecting a single computer for each attack.

The artificial intelligence base bot-viruses are using the same technology that is used in the drone swarms. They will infect a large number of computers, and then they will share their missions, what makes that thing harder to detect. If the computer virus remains in RAM-memory it cannot be detected by the writing process. So the thing is that booting the computer will remove the virus. But the problem is that the artificial intelligence-based complicated systems can mean sending the data from the systems to hackers rather than causing destruction.

Of course, that malicious software can destroy the targeted system, and the destructive viruses can use to cover the tracks of the hackers. If they transfer very much money to their bank accounts they can destroy the evidence of the transfer by destroying the databases. In wartime, the hackers who are operating in military service can try to terminate the kernel-codes of high-tech equipment like GPS-systems.

That denies the change to block the IP-address. The artificial intelligence-based viruses require large programming code and that thing can have a multi-level operational model. At first, the computer virus can slip into the internet as the playing innocent computer code. Then the first stage the dead code will be removed, which makes the computer virus active.

This kind of computer virus uses modular libraries, which makes it invisible. The nucleus of the virus will call the other modules. And that kind of viruses can infect the computers by setting their code in the RAM-memory, which makes it hard to detect them.

The virus cannot be detected by an unauthorized writing process when it will write its code to harddisk as I just wrote. In some visions, the computer virus can store itself in the microprocessors kernel-code. If this virus can infect the factory, what is making the computer's microprocessors, that thing can cause that the entire internet can infect.

(1) https://www.cisecurity.org/white-papers/security-primer-trickbot/

https://blog.malwarebytes.com/detections/trojan-trickbot/

Image: https://www.lifewire.com/what-is-a-computer-virus-4799053

https://curiosityanddarkmatter.home.blog/2020/12/07/trickbot-and-modular-artificial-intelligence-based-trojan-horses-are-extremely-hard-to-detect/

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som

The breakthrough in solid-state qubits.

Hybrid integration of a designer nanodiamond with photonic circuits via ring resonators. Credit Steven Burrows/Sun Group (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) ****************************************** The next part is from ScitechDaily.com "JILA breakthrough in integrating artificial atoms with photonic circuits advances quantum computing efficiency and scalability". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "In quantum information science, many particles can act as “bits,” from individual atoms to photons. At JILA, researchers utilize these bits as “qubits,” storing and processing quantum 1s or 0s through a unique system". (ScitechDaily, Solid-State Qubits: Artificial Atoms Unlock Quantum Computing Breakthrough) "While many JILA Fellows focus on qubits found in nature, such as atoms and ions, JILA Associate Fellow and University of Colorado Boulder Assistant

Metamaterials can change their properties in an electric- or electro-optical field.

"Researchers have created a novel metamaterial that can dynamically tune its shape and properties in real-time, offering unprecedented adaptability for applications in robotics and smart materials. This development bridges the gap between current materials and the adaptability seen in nature, paving the way for the future of adaptive technologies. Credit: UNIST" (ScitechDaily, Metamaterial Magic: Scientists Develop New Material That Can Dynamically Tune Its Shape and Mechanical Properties in Real-Time) Metamaterials can change their properties in an electric- or electro-optical field.  An electro-optical activator can also be an IR state, which means. The metamorphosis in the material can thermally activate.  AI is the ultimate tool for metamaterial research. Metamaterials are nanotechnical- or quantum technical tools that can change their properties, like reflection or state from solid to liquid when the electric or optical effect hits that material. The metamaterial can cru