Skip to main content

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

.

TrickBot and modular artificial intelligence-based Trojan horses are extremely hard to detect.

The TrickBot is a modular banking Trojan, which can infect the Bios-drivers of the system. The TrickBot is complicated malware, which is forming by the modules. And that thing is making that malware a very powerful tool. cisecurity.org claims that TrickBot cal also drops the other malicious software to the computer, and it means that this kind of thing is the new type of Trojan.

The modular structure means that the virus can slip into the internet the module to module, which makes the firewall very hard to detect. The single modules can be innocent code, but when modules are connected. This thing can be forming very complicated computer viruses that can use artificial intelligence modules. The complicated data viruses are meant rather for spying on the system than causing destruction.

In that case, the artificial intelligence searches the necessary data from the targeted system and sends that those bits to hackers. Those artificial intelligence-based systems can search for words like "secret", "confidential" and other things like GPS. And they can slip that data away from the system in the mode, where it's hard to detect.

That means the computer virus can encrypt the data by multiplying the ASCII-codes with some base- or regular numbers. Because that thing happens before the firewall, there is the possibility that the firewall cannot detect that highly classified data is delivering out of the system.

The modular structure means that there might be many groups of hackers or developers in this kind of thing. The thing is that the virus scanners can use for bad purposes. The computer can infect in purpose and then the virus code can isolate from the infected computers. Then the hackers can make their modifications to the code. And the modular structure makes that kind of virus algorithm a very flexible tool. The hackers can involve and remove the code modules that are like books in the library to that virus.

But the new type of viruses is more advanced. The artificial intelligence-based computer viruses can infect many computers, and form the invisible bot-network. When the computer viruses are attacking against the targeted systems, the artificial intelligence-based independently operating bot-network an attack against the system by selecting a single computer for each attack.

The artificial intelligence base bot-viruses are using the same technology that is used in the drone swarms. They will infect a large number of computers, and then they will share their missions, what makes that thing harder to detect. If the computer virus remains in RAM-memory it cannot be detected by the writing process. So the thing is that booting the computer will remove the virus. But the problem is that the artificial intelligence-based complicated systems can mean sending the data from the systems to hackers rather than causing destruction.

Of course, that malicious software can destroy the targeted system, and the destructive viruses can use to cover the tracks of the hackers. If they transfer very much money to their bank accounts they can destroy the evidence of the transfer by destroying the databases. In wartime, the hackers who are operating in military service can try to terminate the kernel-codes of high-tech equipment like GPS-systems.

That denies the change to block the IP-address. The artificial intelligence-based viruses require large programming code and that thing can have a multi-level operational model. At first, the computer virus can slip into the internet as the playing innocent computer code. Then the first stage the dead code will be removed, which makes the computer virus active.

This kind of computer virus uses modular libraries, which makes it invisible. The nucleus of the virus will call the other modules. And that kind of viruses can infect the computers by setting their code in the RAM-memory, which makes it hard to detect them.

The virus cannot be detected by an unauthorized writing process when it will write its code to harddisk as I just wrote. In some visions, the computer virus can store itself in the microprocessors kernel-code. If this virus can infect the factory, what is making the computer's microprocessors, that thing can cause that the entire internet can infect.

(1) https://www.cisecurity.org/white-papers/security-primer-trickbot/

https://blog.malwarebytes.com/detections/trojan-trickbot/

Image: https://www.lifewire.com/what-is-a-computer-virus-4799053

https://curiosityanddarkmatter.home.blog/2020/12/07/trickbot-and-modular-artificial-intelligence-based-trojan-horses-are-extremely-hard-to-detect/

Comments

Popular posts from this blog

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

Terrifying visions of genetic engineering.

 Terrifying visions of genetic engineering.  The modern Hounds of Baskerville ABW:s (Advanced biological weapons are the modern Hounds of Baskerville. The term ABV means the animal which is genetically engineered. And which is controlled by using some interactive electronic systems. There is a possibility to connect the action camera to dogs collars. And transmit commands to that animal by using electronic systems. Spoken words can use to the commands.  Or they can be a series of sounds that are stored in the sound files. When the operator activates a certain file that sound means a certain command to the animals. There is the possibility to automatize some commands by connecting the system to the image recognition tool. When the action camera sees something that is stored in the memory of the computer. That system sends the coded order to the animal.  Nanotechnology and genetic engineering are the most lethal combination in the world. The ABW:s (Advanced Biological ...

The story of (Northrop?) TR3A "Black Manta"

    Image I The story of (Northrop?) TR3A "Black Manta" Sometimes there have been discussions that the mysterious TR3A "Black Manta" was a study project for the B-2 bomber.  That means that TR3A was used as the flying mockup for testing the aerodynamic and control solutions for the B-2 "Spirit" bomber. The thing that supports this thing is that the manufacturer of both planes is Northrop corporation.  Along with "Aurora" was flying one other mysterious aircraft, TR3A "Black Manta". The system is described as the "Stealth VTOL" (Vertical Take-Off and Landing) aircraft. Unless the mysterious TR3B, the Northrop TR3A is the conventional VTOL-aircraft, what is using regular jet engines, but what has the stealth-body.  Image II The thing is that the stealth-reconnaissance aircraft, which uses a similar technology with the Northrop B-2 bomber would be an interesting part of the weapon arsenal. There is a possibility that the TR3A was...