Skip to main content

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

 

.

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

The TrickBot is a modular banking Trojan, which can infect the Bios-drivers of the system. The TrickBot is complicated malware, which is forming by the modules. And that thing is making that malware a very powerful tool. cisecurity.org claims that TrickBot cal also drops the other malicious software to the computer, and it means that this kind of thing is the new type of Trojan.

The modular structure means that the virus can slip into the internet the module to module, which makes the firewall very hard to detect. The single modules can be innocent code, but when modules are connected. This thing can be forming very complicated computer viruses that can use artificial intelligence modules. The complicated data viruses are meant rather for spying on the system than causing destruction.

In that case, the artificial intelligence searches the necessary data from the targeted system and sends that those bits to hackers. Those artificial intelligence-based systems can search for words like "secret", "confidential" and other things like GPS. And they can slip that data away from the system in the mode, where it's hard to detect.

That means the computer virus can encrypt the data by multiplying the ASCII-codes with some base- or regular numbers. Because that thing happens before the firewall, there is the possibility that the firewall cannot detect that highly classified data is delivering out of the system.

The modular structure means that there might be many groups of hackers or developers in this kind of thing. The thing is that the virus scanners can use for bad purposes. The computer can infect in purpose and then the virus code can isolate from the infected computers. Then the hackers can make their modifications to the code. And the modular structure makes that kind of virus algorithm a very flexible tool. The hackers can involve and remove the code modules that are like books in the library to that virus.

But the new type of viruses is more advanced. The artificial intelligence-based computer viruses can infect many computers, and form the invisible bot-network. When the computer viruses are attacking against the targeted systems, the artificial intelligence-based independently operating bot-network an attack against the system by selecting a single computer for each attack.

The artificial intelligence base bot-viruses are using the same technology that is used in the drone swarms. They will infect a large number of computers, and then they will share their missions, what makes that thing harder to detect. If the computer virus remains in RAM-memory it cannot be detected by the writing process. So the thing is that booting the computer will remove the virus. But the problem is that the artificial intelligence-based complicated systems can mean sending the data from the systems to hackers rather than causing destruction.

Of course, that malicious software can destroy the targeted system, and the destructive viruses can use to cover the tracks of the hackers. If they transfer very much money to their bank accounts they can destroy the evidence of the transfer by destroying the databases. In wartime, the hackers who are operating in military service can try to terminate the kernel-codes of high-tech equipment like GPS-systems.

That denies the change to block the IP-address. The artificial intelligence-based viruses require large programming code and that thing can have a multi-level operational model. At first, the computer virus can slip into the internet as the playing innocent computer code. Then the first stage the dead code will be removed, which makes the computer virus active.

This kind of computer virus uses modular libraries, which makes it invisible. The nucleus of the virus will call the other modules. And that kind of viruses can infect the computers by setting their code in the RAM-memory, which makes it hard to detect them.

The virus cannot be detected by an unauthorized writing process when it will write its code to harddisk as I just wrote. In some visions, the computer virus can store itself in the microprocessors kernel-code. If this virus can infect the factory, what is making the computer's microprocessors, that thing can cause that the entire internet can infect.

(1) https://www.cisecurity.org/white-papers/security-primer-trickbot/

https://blog.malwarebytes.com/detections/trojan-trickbot/

Image: https://www.lifewire.com/what-is-a-computer-virus-4799053

https://curiosityanddarkmatter.home.blog/2020/12/07/trickbot-and-modular-artificial-intelligence-based-trojan-horses-are-extremely-hard-to-detect/

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...