This unreported trojan managed to steal 1.2 TB of personal data

| Author: Secretariat | Filed under: General News
This unreported trojan managed to steal 1.2 TB of personal data

Trojan remain undetected for two years while infecting over 3m computers.

A malicious trojan that want unreported has managed to steal 1.2TB of personal data including passwords, cookies and files from unsuspecting users online.

Security experts from NordLocker along with third-party researchers analyzed statistical data from 3.25m computers running Windows 10 that were infected to compile a new study on the unreported trojan and the malware behind it.

The 1.2TB of data stolen from the trojan was discovered in a database that includes billions of personal records and dates back to 2018-2020. To distribute their malware, cybercriminals uses malicious email attachments and illegal software.

  • We've compiled a list of the best endpoint protection software
  • Keep your devices virus free with the best malware removal software
  • Also check out our roundup of the best firewall

The malware was successfully able to steal 26m credentials from around 1m different websites. It stole credentials from social media sites including Facebook (1.5m), Twitter (261k), and Instagram (153k), email service providers including Google (1.5m), Outlook (403k) and Yahoo (224m) as well as streaming services including Netflix (170k), Twitch (106k) and Spotify (61k).

Stolen cookies, files and data
Among the 1.2TB of data, NordLocker's analysts found more than 2bn cookies and surprisingly, 22 percent of them were valid on the day of the discovery. The majority of these stolen cookies came AliExpress (4.8m), Steam (2m), MediaFire (3.2m), Facebook (8m) and YouTube (17.1m).

In addition to helping some websites operate, cookies can also be used by cybercriminals to create a fairly accurate picture of a website visitor including their location, browsing history, habits and interests. Stolen cookies can then be used to impersonate a victim and even potentially to gain access to their online accounts.

The malware also stole over 6.6m files stored on the desktops and Downloads folders of victims including text files, image files and other documents. Cybersecurity expert at NordLocker, Oliver Noble explained how consumers are getting smarter when it comes to protecting themselves online though there is still work to be done, saying:

“On average, the malware stole only 2 files from each computer. This indicates that users are getting smarter and more security-focused, which means they keep important information in the cloud or somewhere else to conceal it from prying eyes. However, we also found that some people still store confidential documents, photocopies of passports, and even passwords written down in Notepad on their desktop, thus risking the exposure of their most sensitive data.”

In order to avoid falling victim to this trojan and other malware like it, users should install antivirus software on their Windows machines, use malware removal software to deal with viruses, keep a backup of their most important files in their cloud storage and avoid opening attachments from unknown senders as well as illegally downloading software online.

Source:  TechRadar

Working with the Law Society

The ABI is the only association in this industry to be recognised by the Law Society of England and Wales, and included in the Law Society of Scotland's approved Supplier Scheme.

The highest independent professional bodies for solicitors put their trust in us. We’re confident you can do the same.

The ABI other partners also recognise the value of affiliation to the principal professional body in the investigation and litigation support sector:

COURTSDESK SEARCHER is an on-demand search for court cases, or parties involved in court cases, in England and Wales and the Republic of Ireland.

https://www.lawsociety.org.uk/membership/offers/abi
Scotland Law Society logo
Professional Indemnity Insurance
Thank you, your message has been sent.
A member of our team will be in touch shortly.
Loading...
Working...