Technology has adapted exponential changes in the last two decades. Globalization finally found the wings with Internet! With exponential increase in Internet users, information security became a huge challenge to answer!
Luckily the think tanks of the industry came up with many easy solutions! One of these solutions was using a Virtual Private network – VPN Security!
A Virtual Private network helped the users in the following manners:
1) Identity Protection by using proxy servers
2) Encrypted Data to Ensure Confidentiality
3) Checksum integrity to ensure zero breach
4) Authentication protocols to restrict unauthorized users and;
5) Data transfer methodologies to ensure correct information parsing
These Virtual networks were categorized as Public or Private VPNs.
Though they were intended to be useful, VPNs were exploited by Information stealers and hackers for unethical purposes. The recent example of this being Pirate Chick VPN.
Deceptively Legitimate in appearance, Pirate chick VPN lured the innocent users with help of agreement pages & privacy policy trap. It also promoted its reach in the mass with help of false trial offers without credit card information. With a digitally signed installer, it was even successful in fooling the popular Internet securities alert mechanism.
Many users downloaded this malware with a thought of accessing internet with complete security.
Rather than providing security, it downloads a rogue process monitor to the system that acts malevolent!
Name | Pirate Chick VPN |
Type | Trojan |
Category | Malware |
Targeted Operating System | Windows |
Targeted Browsers | Internet Explorer, Firefox, Google Chrome, Opera |
Pretend to be a legitimate VPN service, Pirate Chick VPN is actually a Trojan horse. Once infiltrated the system, it immediately connects to its server to install malicious malwares silently. Majorly, the password stealing Trojan – AZORult Trojan is distributed by it. Trusting its legitimacy, people often download the nasty tool from its official website.
To give an impression of being safe to the users, initially it offers a three-month’s trial. During the trial period, the tool performs VPN functionalities and nothing else. However, as mentioned above, the threat begins right with its installation. The tool, along with performing the VPN services, installs the malicious payload in the background.
However, the ultimate purpose of Pirate Chick VPN is to silently install additional destructive malwares on the system.
Trojans are designed to secretly infiltrate the system. It then silently installs devastating malware from its server. Hence, there are no particular symptoms that are associated with Pirate Chick VPN. However, cyber experts have noticed changes in the speed and performance of the victim’s system. Once this malicious Trojan gains the access of your system, it slows down the operations with additional background processes.
Apart from decreasing the speed of performance, it may steal your personal or non – personal information. Once the system is infiltrated by Pirate chick VPN Trojan, it steals information like – browsing history, usernames, passwords, IP addresses and what not!
The primary gateway of this Password stealing Trojan is via ‘Bundling’. Bundling is basically a secretive installation of third party program along with the regular software. These are generally hidden under ‘Advanced settings’ of the ‘Installation’ process.
When installing any software, people do not expect to get anything malicious alongside the regular application.
Moreover, acting as a legitimate VPN, the developers promote them on pop-up ads, banners or spread using ad bundles. One can easily download it for free from its official website. It also provides you a free trial!
Hence, make sure to avoid the fake promotional ads on your screen. Do not get trapped in the network of these malicious advertisements.
5 Click on the username and enter the password (if any).
Hits: 114
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.