Jacksbot

By Domesticus in Backdoors

Jacksbot is a Java based, cross platform malware infection that has worried PC security analysts. At first, Jacksbot was not considered a particularly dangerous malware infection. However, in November of 2012, Jacksbot started to spread at increased rates and has now caught the attention of malware researchers around the world. One of the reasons why Jacksbot is particularly dangerous is because Jacksbot can attack computers using Mac OS X or Windows becuse it uses the Java RunTime Environment to attack a computer. The latest versions of Jacksbot exploit several known Java vulnerabilities simultaneously.

The Jacksbot family of malware uses malicious Java scripts to carry out attacks. No infections in the wild were detected for a long time, which led to PC security analysts considering Jacksbot variants as low level threats. However, increasing numbers of computers have become infected with these kinds of malware infections, first in Australia and Malaysia and then spreading to other locations around the world. The once contained Trojan has now started to spread through social engineering channels.

The most common Jacksbot variants are distributed as a fake mod for Minecraft, a popular computer game that allows players to build and explore massive virtual worlds made out of cubic blocks. Jacksbot variants have one particular command that is specifically used to steal Minecraft passwords (this command is accessed by typing MC on the Jacksbot console). Jacksbot has a RAT (Remote Access Trojan) component that allows criminals to control the victim's computer from a remote location. Jacksbot variants can be utilized to execute various malicious acts on the victim's computer, making Jacksbot a potential threat to the victim's privacy.

While RATs have legitimate uses (for example, allowing someone to access his/her office computer from the comfort of their home), criminals use these kinds of remote access tools to control the victim's computer remotely. Jacksbot has a console that allows criminals to steal data from the infected computer, force it to connect to a particular URL and manipulate files on the infected computer. Using Jacksbot, a criminal can delete data on the infected hard drive, open and stop applications, copy files and essentially control the infected computer with nearly the same level of control as if the criminal were sitting in front of your screen.

Related Posts

Trending

Most Viewed

Loading...