A little over a year ago, experts identified this malware capable of stealing information in multiple ways, revealing itself to be an insidious threat but from which it is possible to defend oneself.

malware snake

Snake, this is the name of the malware, is used by cybercriminals to infect the victim's PC and exfiltrate data and information in many ways, threatening the privacy and security of the operations carried out on the network. Once installed, in fact, it can record the keys, make screeshot and copy the access credentials to different applications such as the FTP client or e-mail, but also those typed on the web browser. So it can also allow cybercriminals to get hold of banking credentials. It can even geolocate the system starting from the IP address.

How Snake works and how it can infect a PC.

Malware is usually installed on the victim's PC via a phishing email attachment with various themes. These are compressed files with extension, zip, tar and rar which contain an executable inside. Once downloaded, Snake installs itself automatically and begins its work, first of all by stopping anti-virus systems that could detect it. Subsequently it begins to collect information on the operating system, on the IP address and to copy the access credentials to the main apps and web services. All this information is then sent to the hacker who distributed it: technically exfiltrated.

Obviously the hacker in question can safely resell all the data on the dark web, monetizing the stolen information. Snake is also available for purchase on the dark web at a very low cost, in fact it can be found starting from 25 dollars, and this has favored its diffusion.

How to defend against Snake malware.

Despite being widespread, defending yourself against Snake is possible, using the best cyber security practices that we should all know by now. In particular, it is always necessary to pay the utmost attention to everything you download, verifying that the source is reliable and that it is a service actually requested.
 
Another practice that is always recommended is to create very secure and unique passwords, easy to memorize thanks to special tools, and to change them often, to block any criminal actions and prevent the use of possible stolen passwords already present on the dark web.
Left B - Web Idea


newsletter image