{"id":35991,"date":"2020-07-01T16:50:00","date_gmt":"2020-07-01T16:50:00","guid":{"rendered":"https:\/\/icrowdnewswire.com\/?p=2629540"},"modified":"2020-07-01T16:50:00","modified_gmt":"2020-07-01T16:50:00","slug":"this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing","status":"publish","type":"post","link":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/","title":{"rendered":"This highly stealthy malware might infect your device without you ever knowing"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"233\" height=\"24\" src=\"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"display: block; margin-bottom: 5px; clear:both;max-width: 100%;\" link_thumbnail=\"\" \/><\/p>\n<header>\n<div class=\"byline-social\">\n<p class=\"strapline\">Glupteba has evolved into a &lsquo;stealthy and complex malware distribution network&rsquo;<\/p>\n<\/div>\n<\/header>\n<section class=\"content-wrapper\">\n<div class=\"box less-space\">\n<div><img decoding=\"async\" class=\" block-image-ads hero-image\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/d94Ep9t7i46PZq48hbjJAn-320-80.jpg\" alt=\"\" data-original-mos=\"https:\/\/cdn.mos.cms.futurecdn.net\/d94Ep9t7i46PZq48hbjJAn.jpg\" data-pin-media=\"https:\/\/cdn.mos.cms.futurecdn.net\/d94Ep9t7i46PZq48hbjJAn.jpg\" \/><\/div>\n<p><span class=\"credit\">(Image credit: Shutterstock \/ GoodStudio)<\/span><\/div>\n<div id=\"article-body\" class=\"text-copy bodyCopy auto\">\n<p>Malware operators are spending an inordinate amount of time and resources developing features to conceal malicious programs from&nbsp;<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/news\/cybersecurity-what-is-it\" target=\"_blank\" rel=\"noopener noreferrer\" data-component-tracked=\"1\" data-custom-tracking-id=\"5220037836059754000\">cybersecurity<\/a>&nbsp;software.<\/p>\n<p>According to a new analysis of Glupteba malware (one such stealth-oriented strain), cybercriminals are going to extreme lengths to remain undetected in an infected system &#8211; expanding the opportunity to deliver additional payloads and map out a victim&rsquo;s network.<\/p>\n<aside class=\"hawk-widget\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" data-widget-id=\"1149880774980699000\" data-result=\"missing\"><\/aside>\n<p>Researchers at SophosLabs uncovered a multitude of creative techniques utilized by the malware, including adding itself to&nbsp;<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/reviews\/windows-defender\" target=\"_blank\" rel=\"noopener noreferrer\" data-component-tracked=\"1\" data-custom-tracking-id=\"1117360869286694700\">Windows Defender<\/a>&nbsp;exception lists, masking communications with command-and-control servers and installing rootkits to conceal its processes.<\/p>\n<ul>\n<li>Here&#8217;s our list of the&nbsp;<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-malware-removal\" target=\"_blank\" rel=\"noopener noreferrer\" data-component-tracked=\"1\" data-custom-tracking-id=\"6861522709218122000\">best malware removal<\/a>&nbsp;software around<\/li>\n<li>Check out our list of the&nbsp;<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/best-ransomware-protection\" target=\"_blank\" rel=\"noopener noreferrer\" data-component-tracked=\"1\" data-custom-tracking-id=\"4399857831235317000\">best ransomware protection<\/a>&nbsp;services available<\/li>\n<li>We&#8217;ve built a list of the&nbsp;<a class=\"hawk-link-parsed\" href=\"https:\/\/www.techradar.com\/best\/password-manager\" target=\"_blank\" rel=\"noopener noreferrer\" data-component-tracked=\"1\" data-custom-tracking-id=\"7152537322685912000\">best password managers<\/a>&nbsp;out there<\/li>\n<\/ul>\n<p>The creators also developed measures to closely monitor the malware&rsquo;s processes, ensuring they perform without failure and thereby minimizing the chances of triggering a network alert.<\/p>\n<p>&ldquo;The most unscrupulous threat actors design their malware to be stealthy. This means that they strive to stay under the radar and remain in the wild for a long time, performing reconnaissance and collecting information to determine their next move and hone their malicious techniques,&rdquo; explained Luca Nagy, Security Researcher at Sophos.<\/p>\n<p>&ldquo;While researching Glupteba, we realized the actors behind the bot are investing immense effort in self-defense. Security teams need to be on the lookout for such behavior,&rdquo; she added.<\/p>\n<h2 id=\"malware-detection\">Malware detection<\/h2>\n<p>The most alarming consequence of the increase in stealth-based approaches among hackers is the potential for secondary infections.<\/p>\n<p>Although Glupteba is dangerous in its own right &#8211; capable of scraping web browser information (including account credentials), exfiltrating large volumes of device data and hijacking vulnerable routers &#8211; the real threat lies in its ability to pave the way for further malicious payloads.<\/p>\n<p>The most common payload associated with Glupteba is a cryptominer, which uses the victim&rsquo;s compute power to mine cryptocurrency (a process infamous for its high energy consumption, and therefore high cost) on behalf of the hacker.<\/p>\n<p>However, Sophos believes the malware&rsquo;s portfolio of associated payloads will only expand as incremental improvements are made.<\/p>\n<p>&ldquo;If I were to make an educated guess, I&rsquo;d say the Glupteba attackers are angling to market themselves as a malware-delivery-as-a-service provider to other malware makers who value longevity and stealth over the noisy endgame of, for instance, a ransomware payload,&rdquo; said Nagy.<\/p>\n<p>To minimize the chances of suffering a malware infection in the first place, Sophos advises users take particular care when running executable programs of dubious origin, ensure all software and firmware is up to date, and install antivirus software on all devices.<\/p>\n<\/div>\n<\/section>\n<p class=\"tags\">\n<div><strong>See Campaign: <\/strong><a href=\"https:\/\/www.techradar.com\/news\/cybersecurity-what-is-it\" target=\"_blank\">https:\/\/www.techradar.com\/news\/cybersecurity-what-is-it<\/a><br \/><b>Contact Information:<\/b><br \/> Joel Khalili<\/p>\n<p><b>Tags:<\/b><br \/><a href=\"\"><\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/news-category\/wire\/\" rel=\"category tag\">Wire<\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/global-regions\/united-states\/\" rel=\"category tag\">United States<\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/language\/english\/\" rel=\"category tag\">English<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"\" alt=\"image\" width=\"400\" height=\"300\" class=\"cwdfimg\" \/><\/div>\n<div>\n<h3>Contact Information:<\/h3>\n<p> Joel Khalili<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"233\" height=\"24\" src=\"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png\" alt=\"\">Glupteba has evolved into a &lsquo;stealthy and complex malware distribution network&rsquo; (Image credit: Shutterstock \/ GoodStudio) Malware operators are spending an inordinate amount of time and resources developing features to conceal malicious programs from&nbsp;cybersecurity&nbsp;software. According to a new analysis of Glupteba malware (one such stealth-oriented strain), cybercriminals are going to extreme lengths to remain undetected &hellip; <a href=\"https:\/\/icrowdnewswire.com\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/\">Continue reading <span>This highly stealthy malware might infect your device without you ever knowing<\/span><\/a> <a href=\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,22,54],"tags":[],"class_list":["post-35991","post","type-post","status-publish","format-standard","hentry","category-english","category-united-states","category-wire"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This highly stealthy malware might infect your device without you ever knowing - Business<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This highly stealthy malware might infect your device without you ever knowing - Business\" \/>\n<meta property=\"og:description\" content=\"Glupteba has evolved into a &lsquo;stealthy and complex malware distribution network&rsquo; (Image credit: Shutterstock \/ GoodStudio) Malware operators are spending an inordinate amount of time and resources developing features to conceal malicious programs from&nbsp;cybersecurity&nbsp;software. According to a new analysis of Glupteba malware (one such stealth-oriented strain), cybercriminals are going to extreme lengths to remain undetected &hellip; Continue reading This highly stealthy malware might infect your device without you ever knowing Continue Reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/\" \/>\n<meta property=\"og:site_name\" content=\"Business\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-01T16:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png\" \/>\n<meta name=\"author\" content=\"Aneesa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aneesa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/\",\"url\":\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/\",\"name\":\"This highly stealthy malware might infect your device without you ever knowing - Business\",\"isPartOf\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png\",\"datePublished\":\"2020-07-01T16:50:00+00:00\",\"author\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/cee3758d3201f95199de3522858ca7e2\"},\"breadcrumb\":{\"@id\":\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#primaryimage\",\"url\":\"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png\",\"contentUrl\":\"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ipsnews.net\/business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This highly stealthy malware might infect your device without you ever knowing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ipsnews.net\/business\/#website\",\"url\":\"https:\/\/ipsnews.net\/business\/\",\"name\":\"Business\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ipsnews.net\/business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/cee3758d3201f95199de3522858ca7e2\",\"name\":\"Aneesa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5635ace541744f4e232d93d2fafa63d478ed1fd5c863cbc1484fc2148961368f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5635ace541744f4e232d93d2fafa63d478ed1fd5c863cbc1484fc2148961368f?s=96&d=mm&r=g\",\"caption\":\"Aneesa\"},\"sameAs\":[\"https:\/\/icrowdnewswire.com\/fc\"],\"url\":\"https:\/\/ipsnews.net\/business\/author\/aneesa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This highly stealthy malware might infect your device without you ever knowing - Business","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/","og_locale":"en_US","og_type":"article","og_title":"This highly stealthy malware might infect your device without you ever knowing - Business","og_description":"Glupteba has evolved into a &lsquo;stealthy and complex malware distribution network&rsquo; (Image credit: Shutterstock \/ GoodStudio) Malware operators are spending an inordinate amount of time and resources developing features to conceal malicious programs from&nbsp;cybersecurity&nbsp;software. According to a new analysis of Glupteba malware (one such stealth-oriented strain), cybercriminals are going to extreme lengths to remain undetected &hellip; Continue reading This highly stealthy malware might infect your device without you ever knowing Continue Reading &rarr;","og_url":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/","og_site_name":"Business","article_published_time":"2020-07-01T16:50:00+00:00","og_image":[{"url":"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png","type":"","width":"","height":""}],"author":"Aneesa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aneesa","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/","url":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/","name":"This highly stealthy malware might infect your device without you ever knowing - Business","isPartOf":{"@id":"https:\/\/ipsnews.net\/business\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#primaryimage"},"image":{"@id":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#primaryimage"},"thumbnailUrl":"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png","datePublished":"2020-07-01T16:50:00+00:00","author":{"@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/cee3758d3201f95199de3522858ca7e2"},"breadcrumb":{"@id":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#primaryimage","url":"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png","contentUrl":"https:\/\/icrowdnewswire.com\/wp-content\/uploads\/2020\/06\/3998-ICN.png"},{"@type":"BreadcrumbList","@id":"https:\/\/ipsnews.net\/business\/2020\/07\/01\/this-highly-stealthy-malware-might-infect-your-device-without-you-ever-knowing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ipsnews.net\/business\/"},{"@type":"ListItem","position":2,"name":"This highly stealthy malware might infect your device without you ever knowing"}]},{"@type":"WebSite","@id":"https:\/\/ipsnews.net\/business\/#website","url":"https:\/\/ipsnews.net\/business\/","name":"Business","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsnews.net\/business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/cee3758d3201f95199de3522858ca7e2","name":"Aneesa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5635ace541744f4e232d93d2fafa63d478ed1fd5c863cbc1484fc2148961368f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5635ace541744f4e232d93d2fafa63d478ed1fd5c863cbc1484fc2148961368f?s=96&d=mm&r=g","caption":"Aneesa"},"sameAs":["https:\/\/icrowdnewswire.com\/fc"],"url":"https:\/\/ipsnews.net\/business\/author\/aneesa\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/35991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/comments?post=35991"}],"version-history":[{"count":1,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/35991\/revisions"}],"predecessor-version":[{"id":35992,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/35991\/revisions\/35992"}],"wp:attachment":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/media?parent=35991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/categories?post=35991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/tags?post=35991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}