Skip to main content

Could Your Computer Be Infected by Blackshades?

Could Your Computer Be Infected by Blackshades?
Here’s a list of possible indicators that your computer may be infected with Blackshades or similar remote access tool malware:
  • Mouse cursor moves erratically with no input from user;
  • Web camera light (if equipped) unexpectedly turns on when web camera is not in use;
  • Monitor turns off while in use;
  • Usernames and passwords for online accounts have been compromised;
  • Unauthorized logins to bank accounts or unauthorized money transfers;
  • Text-based chat window appears on your computer’s desktop unexpectedly;
  • Computer files become encrypted and ransom demand is made to unlock files.
Blackshades malware affects Microsoft Windows-based operating systems. If you believe you or someone you know may have a computer that is infected with this malware, search the computer’s hard drive for the following files that are known to be present on Blackshade-infected computers:
  • dos_sock.bss
  • nir_cmd.bss
  • pws_cdk.bss
  • pws_chro.bss
  • pws_ff.bss
  • pws_mail.bss
  • pws_mess.bss
To perform the above check, click the Start menu and type each file name in the search field. If the search yields positive matches for one or more of these files, the computer may be infected with Blackshades.
In addition to the above files being added to the computer’s hard drive, Blackshades also makes modifications to the Windows registry. The exact location may vary depending on the version of the Microsoft Windows you're using, but the following registry subkey is added:
  • Computer\HKEY_CURRENT_USER\Software\VBandVBA Program Settings\SrvID\ID\[string of letters and numbers]
To perform a check for this registry modification, take the following steps:
  1. Click the Start menu.
  2. Type “regedit” in the search field.
  3. Execute the Registry Editor (regedit.exe). If prompted, select “Yes” to allow the program to make changes to the computer.
  4. Select “Edit” from the window toolbar.
  5. Select “Find” from the Edit menu.
  6. Type “SrvID” in the Find field.

Anyone who performs the above checks and gets positive results is encouraged to submit a complaint to the local or International Internet Crime Complaint Center. Please include the term “Blackshades” in the incident description section of the complaint.
And for assistance on removing Blackshades, please contact your Internet service provider, your antivirus software company, or another computer security professional.

Comments

Popular posts from this blog

This is How Engineers Cook

How do you create a PMO Strategic Plan that provide value?

How do you create a PMO Strategic Plan that provide value?

Firstly, identify that the Strategic Plan for the PMO is not the PMO Charter.
The PMO charter is the legislative mandate for the PMO. It defines the role, purpose and functions of the PMO. It expresses who the PMO's sponsors and customers are, the services that it offers, and the staffing and support structures required to deliver those services. And, it assumes that a decision to have a PMO has already been made.
Secondly, align the Strategic Plan for the PMO to the needs of the business for which the PMO exists to serve.
For example, when you do this, providing project management assistance to the organization and implementing a project management system is not the mission, rather, they become strategies in support of the goals and objectives to be achieved.
To build an outcomes-driven Strategic Plan for the PMO, it is helpful to follow a top down format. The most commonly used and accepted format is the classical strateg…

IT Security Maturity Assessment | Control Self Assessment

IT – Security Maturity Assessment – Control Self-Assessment IT Security maturity assessment: it is a Self-Evaluation assessment carried out by organization that informs where it stands in terms of IT Security and shows its Strength, weakness and areas where  IT security improvement is needed in an organization. Organizations analyze IT Security on the bases of ISO 27002 standards. This tool was intended for use by an institution as a whole, although a unit within an institution may also use it to help determine the maturity of its information security program. Unless otherwise noted, it should be completed by chief information officer, chief information security officer or equivalent, or a designee and hardly takes few hours to analyze the overall IT maturity. The rating scale consist on 5 levels from 1 to 5 and every IT security related point carefully analyze by the analyze maturity team or individual and then they decided where that point put down.


Level 1 Level 2 Level 3 Level 4 Level 5 P…