Slingshot malware infection
News | 03/16/2018

Slingshot malware compromised the security of over 100 targets

About: The Slingshot malware has been reported to be an advanced malware infection by Kespersky. As per the research of Kespersky, this malware program can spy on the user system and steal their sensitive data for some malicious reasons.

| News | Slingshot malware compromised the security of over 100 targets

This Friday Kespersky revealed the existence of this long running hacking campaign. The Kespersky Lab discovered this advanced malware infection that is named as the Slingshot Malware. According to Kespersky, this infection has planted spyware on over hundred targets in over eleven countries.

SlingShot router attack

A majority of targets are from Yemen and Kenya. These hackers accessed the deepest level of victim’s computer’s operating system and taking in complete control of the targeted machine. However, Kespersky, haven’t yet described how the spyware infected the targets. In a few cases, the malicious code has been installed via the small-business-grade routers which have been compromised by the Slingshot Malware.

Routers are always an attractive target for the hackers. This time, unlike the previous router – hacking campaigns, the slingshot hacker installs exploited routers’ position as a little scrutinized foothold which can easily spread the infections to vulnerable computers within a network which allows a deeper access to spies. The Mikro Tik routers were the major target and the company has already resolved the vulnerability. However, Kespersky still believes that other routers can still be infected.

Kespersky reported that the SlingShot malware can collect every kind of information from the PC’s which are attacked through a compromised router. It can spy on the user and collect sensitive information which includes keyboard data, screenshot, passwords and other information.

There are still many unanswered questions about the SlingShot malware attack. It is still unknown whether the routers served to be the initial point of infection for a majority of the Slingshot router attack. The thing which makes SlingShot so dangerous is that it is carried on the legitimate router downloads and file executions.

If you dig deep down into the details of vulnerabilities, it is no doubt that this particular malware program is highly sophisticated. The researchers suspected that it is the work of highly organized and professional group which is likely to be state-sponsored. As per its capabilities, this malware infection can access the system and is capable of stealing any type of information which is stored on the infected system.

In order to prevent a computer system from such vulnerabilities, it is important to take some early prevention. Here is a list of SlingShot Malware protection tips –

  1. Keeping the Operating System Updated- In order to remain protected and avoid such infections, it is recommended to keep your Operating System updated by enabling the automatic update on your system. The systems with outdated or older versions of Operating System become an easy target for the attackers.
  2. Resist clicking on spam emails – One of the major techniques used for malware distribution is forwarding spam emails to the user. The system gets infected as soon as the user clicks on the attachment. These mails appear to be genuine, so be aware and resist falling for these tricks.
  3. Keep an eye on third party installations- It is quite important that you take due care while installing any third party applications for they are major source of such infections. Such malware programs come bundled with the free applications thereby requiring the user to remain cautious.
  4. Regular periodical backup- In order to keep your data and files safe, it is recommended to take regular back up of all your data and files either on an external drive or cloud.
  5. Use Anti-Virus Protection- We strongly recommend the use of antivirus protection/internet security in your PC like 360 Total Security and Bull Guard so that it remains safe.
  6. Enable the Ad Blocker/Popup Blocker in your browser- Enabling the popup blocker/ ad blocker in your chosen browser will help you to stay protected from annoying adware.

Hits: 28

Leave a Reply

Your email address will not be published. Required fields are marked *

Did you find the article informative? Yes NO

Get Regular Updates Related to All the Threats

Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.

Virus Removal Guidelines
Plot No 319, Nandpuri- B Pratap Nagar
Jaipur
Rajasthan 302033
Phone: +91 9799661866