This time the criminals evoked Baldr, a god of light from the Norse mythology to name their treat. Baldr started being noticed on the final months of 2018 and is configured to collect information and attack FTP programs, cryptocurrency wallets, text documents browser profiles, telegram sessions and record data from VPN clients. Baldr can gather data such as social media login data, online banking information, credit card numbers, IP addresses and more. Baldr's code is for sale and can be acquired for $150. Since Baldr doesn't have persistence, its presence cannot be detected, which makes it most threatening than other malware of its kind. However, when in action, Baldr doesn't make any effort to conceal its actions.
It seems that there isn't a campaign set up for distributing so that it must have been attacking its victims one by one. The machines infected by Baldr can become irresponsive, the user can experience unwanted redirections and fake notification and alerts besides displaying a huge amount of advertisements. Baldr can duplicate files, create useless shortcuts and use the CPU resources, which is what causes the unresponsiveness of the affected machine.
Additionally, Baldr can bring other malware to the affected machine, generate BSO error, which will prevent the machine from performing normally and prevents the users from introducing new software elements. God of light or not, Baldr should be eliminated from an infected device upon discovery. The best bet to eliminate this threat is by using a skilled anti-malware tool.
How Can You Detect Malware?Download SpyHunter's Detection Scanner
to Detect Malware.