Monday 24 July 2017

What Is Clickjacking and How To Prevent It



What is clickjacking on Facebook?


A senior technology consultant at Sophos Graham Cluley, said that millions of users had fallen victim to the "clickjacking" or "likejacking" scam. What is Clickjacking? Clickjacking is majorly used on Facebook. It is a security threat similar in nature to the code injected attacks. This is achieved by cyber-punks using transparent techniques to lure the Facebook users to click on a button or a link. Clickjacking is done by using a variety of links, both image and text to achieve the desired results.
The creation of the word “clickjacking” can be attributed to the nature of the attacks. The attack is intended to direct as many clicks as possible to a particular page by the means of fake news or video clips. Thus hijacking the clicks or “clickjacking”. The click then wither get the user to download something or are diverted to another page. Malicious content is cloaked under legitimate pages where cybercriminals make use of iframes and java script to load malicious content from a third party site.
Facebook, defines clickjacking in its own terms as "certain malicious websites that contain code to make your browser take action without your knowledge or consent". Posts on the user’s wall create curiosity and lures the users to click on them.  These links lead to third party sites which then through code injection spread the infected posts to that user’s contacts on Facebook.

How do users encounter this threat?


Such threats are majorly eminent on social networking sites with the features of like and share.  The posts are designed to create curiosity which instigates the users to click and share them.  Thus knowingly or unknowingly we as users to these sites become a medium for their propagation.
Use of Social engineering for Clickjacking?
Wall posts and other techniques used for clickjacking are designed in such a way that they do not look suspicious. Some of the methods used are as under:
Exclusive video and image Clips. Dome post claim to have the pics or videos of an event or about someone that are exclusive. Such luring content pulls the users to read this content thereby falling a victim to clickjacking.

Latest Updates on existing News

We all want an update on the current news and events. Hiding under the mask of such events Clickjacking takes advantage of such users on social networking sites. The most recent example of this was Rowan Atkinson died in a car crush.
Latest Breaking News & Gossips. News regarding celebrities and showbiz events including but not limited to hoaxes are used to trick users.
Offers, Promotions & Win a something Contests. Users are usually attracted to offers, posts and advertisements on social networking sites where content like, “click here to win an iPhone 7”. Click them leads to a survey form and asking the user to like or share the post.
Consequences of liking or click such content?
Social networking sites are now act as the mother ship to such attacks. Once you have clicked on them you are directed to third party sites. These sites generate revenue from these organic visits. Moreover these clicks are harvested to gain the information about the user’s geo location, machine, IP address etc. Some sites ask the user to like and/or share the post to be able to see the exclusive content or enter a contest to win a car or an IPhone..

Wednesday 19 July 2017

Ecosia | Ecosia Virus Removal Tool | Virus Remover

Ever noticed that your chrome, firefox, IE or Edge browsers homepage has been changed or having a new search engine as homepage? If yes then your browser is definitely infected by some kind of browser hijacker or by a browser virus which most likely have entered in your system by bundling itself with any third party software which you might have downloaded from a website. Ecosia Virus is classified as a browser hijacker which comes from the family of malware. It adds various pop-ups, plug-ins , extensions and ads to your browser. 

Ecosia HomePage


The makers of this malicious program, published or launched this as a browser virus which will infect your browsers default settings and in turn will apply an anonymous homepage as your default homepage. As per the sources this virus have already infected more than 9 million users but they have helped Indonesia, madagascar, peru and tanzania by planting trees in enormous number with the help of their 5.5 million active users but still this is considered as a virus and a Potentially unwanted program (PUP).

Targeted Browsers of this virus:
  1. Google Chrome 
  2. Mozilla Firefox
  3. Internet Explorer
     What will Ecosia.org do to malfunction the system:
  1. It will install and will automatically download various malicious extensions that in turn will bring spam ads, deals and fake alert everywhere on your browser.
  2. Over consumption of CPU will slow down your PC performance and this over consumption is done because of this virus.
  3. It downloads various infections in the background.
  4. It exploits bugs of your system to help hacker get inside your computer remotely.
  5. It also tracks users' searches, visited sites, IP address, and similar information. Collected data helps in setting the behavioral marketing strategy.
How Ecosia infects on your PC?

  1. Bundling / Freeware - This virus bundles itself with other third party software and enters in your PC and is installed as a PUP.
  2. Malicious links/websites - Always be very cautious in surfing on internet and on clicking on any link or site as some sites always offer useful extensions but in turn will install malicious browser hijackers.
  3. Spam Email- Double-check any new emails and text messages before you respond to them, especially if they have files attached with them or if they contain shady-looking links. If you think that the new message might be spam, make sure to avoid it and delete it if you can.

How to remove Internet Ecosia? 
 If you want to know the removal steps on how to remove Ecosia virus then do check the link given.
It also has a free malware removal tool to remove all kinds of malware and virus.

Wednesday 12 July 2017

CopyCat | CopyCat Virus For Android Affecting Zygote Android



CopyCat, A new adware has infected about 14 million of Android devices around the world, with the majority hitting Asia (55%), followed by Africa (18%), and then the Americas (12%). This malware is believed to be spreading to Android devices in Southeast Asia, but certain reports confirmed that this Adware has already hit more than 280,000 handsets in the US. This malware attacked one of the enterprise of Check point researchers and then check point researchers ran across copycat virus in march of this year. The security company believes the CopyCatVirus campaign hit its peak between April and May of 2016.


CopyCat virus

How does it work into your mobile?

CopyCat virus, A malware with very well planned capabilities which includes rooting of devices, establishing persistency and injecting code into Zygote OS for Android.
Zygote Android is a daemon which is always responsible for launching of apps in Android OS which allows the malware to control any kind of activity on the device. A classic kind of technology is used by CopyCat virus to conduct all kinds of ad fraud. Copycat hijacks the roots in the user’s device once infected and then allowing the attackers to gain complete access of the infected device. This leaves the user defenseless against the infection. 

Damaging Effects of CopyCat-

1.       Code sharing with hacking community - the sophisticated capabilities developed by adware developers can be adopted by other malware developers, and used to commit bigger crimes.
2.       Theft of sensitive information – Some adware, such as Gooligan, steal sensitive information from their victims, which can later be sold to third parties for monetary gains
3.       Device rooting or jailbreaking – Adware frequently roots or jailbreaks devices, thereby breaking the built-in security mechanisms of Android or iOS, leaving victims defenseless to even the lowest level kind of hacks.