To Disseminate Malware, Hackers are Increasingly Relying on DaaS Platforms

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

 

According to cybersecurity specialists, malware authors are increasingly depending on dropper-as-a-service (DaaS) platforms to propagate their malicious inventions. Sophos recently published a report detailing the rise of DaaS platforms that infect victims who visit piracy websites in search of cracked versions of major business and consumer software. 
A dropper is a programme that, when run, executes malicious code as a payload. The dropper is similar to a trojan, and it may have additional functions, but its primary goal is to get malware onto a victim’s computer, which can be downloaded over the internet or unpacked from data within the dropper.
A customer pays for a dropper-as-a-service to deliver their malware to these systems through droppers. Typically, the DaaS employs a network of websites to transmit droppers to victims’ computers, which then install and execute the customer’s malware. Droppers could be camouflaged as legitimate or cracked software that netizens are fooled into installing. 
“During our recent investigation into an ongoing Raccoon Stealer (an information-stealing malware) campaign, we found that the malware was being distributed by a network of websites acting as a “dropper as a service,” serving up a variety of other malware packages,” Sophos researchers Sean Gallagher, Yusuf Polat shared in a joint blog post. 
The Sophos duo, who were assisted by Anand Ajjan and Andrew Brandt, dubbed this part of the “malware-industrial complex,” saying that such services made it “very inexpensive for would-be cybercriminals with limited expertise to get starte

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: To Disseminate Malware, Hackers are Increasingly Relying on DaaS Platforms