Skip to main content

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

.

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

The TrickBot is a modular banking Trojan, which can infect the Bios-drivers of the system. The TrickBot is complicated malware, which is forming by the modules. And that thing is making that malware a very powerful tool. cisecurity.org claims that TrickBot cal also drops the other malicious software to the computer, and it means that this kind of thing is the new type of Trojan.

The modular structure means that the virus can slip into the internet the module to module, which makes the firewall very hard to detect. The single modules can be innocent code, but when modules are connected. This thing can be forming very complicated computer viruses that can use artificial intelligence modules. The complicated data viruses are meant rather for spying on the system than causing destruction.

In that case, the artificial intelligence searches the necessary data from the targeted system and sends that those bits to hackers. Those artificial intelligence-based systems can search for words like "secret", "confidential" and other things like GPS. And they can slip that data away from the system in the mode, where it's hard to detect.

That means the computer virus can encrypt the data by multiplying the ASCII-codes with some base- or regular numbers. Because that thing happens before the firewall, there is the possibility that the firewall cannot detect that highly classified data is delivering out of the system.

The modular structure means that there might be many groups of hackers or developers in this kind of thing. The thing is that the virus scanners can use for bad purposes. The computer can infect in purpose and then the virus code can isolate from the infected computers. Then the hackers can make their modifications to the code. And the modular structure makes that kind of virus algorithm a very flexible tool. The hackers can involve and remove the code modules that are like books in the library to that virus.

But the new type of viruses is more advanced. The artificial intelligence-based computer viruses can infect many computers, and form the invisible bot-network. When the computer viruses are attacking against the targeted systems, the artificial intelligence-based independently operating bot-network an attack against the system by selecting a single computer for each attack.

The artificial intelligence base bot-viruses are using the same technology that is used in the drone swarms. They will infect a large number of computers, and then they will share their missions, what makes that thing harder to detect. If the computer virus remains in RAM-memory it cannot be detected by the writing process. So the thing is that booting the computer will remove the virus. But the problem is that the artificial intelligence-based complicated systems can mean sending the data from the systems to hackers rather than causing destruction.

Of course, that malicious software can destroy the targeted system, and the destructive viruses can use to cover the tracks of the hackers. If they transfer very much money to their bank accounts they can destroy the evidence of the transfer by destroying the databases. In wartime, the hackers who are operating in military service can try to terminate the kernel-codes of high-tech equipment like GPS-systems.

That denies the change to block the IP-address. The artificial intelligence-based viruses require large programming code and that thing can have a multi-level operational model. At first, the computer virus can slip into the internet as the playing innocent computer code. Then the first stage the dead code will be removed, which makes the computer virus active.

This kind of computer virus uses modular libraries, which makes it invisible. The nucleus of the virus will call the other modules. And that kind of viruses can infect the computers by setting their code in the RAM-memory, which makes it hard to detect them.

The virus cannot be detected by an unauthorized writing process when it will write its code to harddisk as I just wrote. In some visions, the computer virus can store itself in the microprocessors kernel-code. If this virus can infect the factory, what is making the computer's microprocessors, that thing can cause that the entire internet can infect.

(1) https://www.cisecurity.org/white-papers/security-primer-trickbot/

https://blog.malwarebytes.com/detections/trojan-trickbot/

Image: https://www.lifewire.com/what-is-a-computer-virus-4799053

https://curiosityanddarkmatter.home.blog/2020/12/07/trickbot-and-modular-artificial-intelligence-based-trojan-horses-are-extremely-hard-to-detect/

Comments

Popular posts from this blog

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o

Earth 2.0 has been caused discussion about the possibility to find another civilization

    Earth 2.0 has been caused discussion about the possibility to find another civilization The Earth 2.0 or officially Kepler-452b is locating extreme log distance from Earth(1).    A new Earth-type planet has been found near the star, which is similar to our own Sun. The journey to that planet would take 1400 years, even if the spacecraft will reach the speed of the light. The planet has been found in the year 2008, but the confirmation of the existence of that planet has been taken time, but in 2015 the confirmation has been got, and Earth 2.0 has turned true.  The mass of that planet is 1,9 times Earth and the temperature is excellent if we are thinking about liquid water, but the journey to that planet will take so long, that we cannot ever go in there by using regular rockets and technology. The thing is that this kind of planets are the most interesting if we are looking for the lifeforms, which are similar to us, and the problem with that kind of things is that the communicatio

Tunguska meteorite and the natural nuclear fission

  Image I Tunguska meteorite and the natural nuclear fission 1) Tunguska UFO-theory  Tunguska meteorite is the mystery, that has been solved once, but then the case has been open again because Lake Cheko was not suitable for an impact crater. That lake has been introducing as an impact crater of the Tunguska meteorite. But the problem is that the shape of that lake is like a swimming pool. And that means it cannot form by a meteorite. So the mystery remains.  Meteorites can launch the natural nuclear fission if they hit the uranium ore, and transfer the impact energy to that ore. And is the thing that the famous "Tunguska" meteorite caused that kind of effect? There is also a theory that some "UFO" explode in that area, but the thing is that it is only theory, but interesting topics for some TV-series.  So I will begin this text by handling that theory, which is one of the incredible and outstanding theories in the world. Officially there is no physical evidence of