<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hackers Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 28 Jun 2023 04:08:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How to Protect Your Social Media Accounts from Hackers</title>
		<link>https://www.osradar.com/how-to-protect-your-social-media-accounts-from-hackers/</link>
					<comments>https://www.osradar.com/how-to-protect-your-social-media-accounts-from-hackers/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Sun, 02 Jul 2023 20:33:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[social media]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=39163</guid>

					<description><![CDATA[<p>Protecting social media is very important on the Internet. Indeed, they are always targeted by hackers. Examples such as Facebook, Twitter, or Instagram often receive many security threats through phishing attacks, Trojans, keyloggers. But what can you do to improve your protection as much as possible? In this post, we tell you the steps you [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-protect-your-social-media-accounts-from-hackers/">How to Protect Your Social Media Accounts from Hackers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Protecting social media is very important on the Internet. Indeed, they are always targeted by hackers. Examples such as Facebook, Twitter, or Instagram often receive many security threats through phishing attacks, Trojans, keyloggers. But what can you do to improve your protection as much as possible? In this post, we tell you the steps you should take to protect your social networks from any intruder or cyberattack.</p>



<p>Nowadays, the vast majority of us use social networks to keep in touch with friends and family. Social media like Facebook or Instagram are the order of the day. However, they are also the target of cybercriminals to get hold of our profile and infect our contacts with malware. For this reason, it is essential to adequately protect our social networks. In addition to avoid putting ourselves at risk. We can even put all our contacts at risk. Indeed, they could damage and also infect their smartphones.</p>



<h2>Steps to protect social media</h2>



<p>If you want to prevent your <a href="https://www.osradar.com/using-elgg-to-build-a-local-social-networking-site/" target="_blank" rel="noreferrer noopener">social</a> media accounts from being hacked, it is essential that you take certain measures. You must make sure you have everything in perfect condition. You should also take care of the security of both the account and the device you are going to use. Therefore, check these steps to avoid problems.</p>



<h3>Use strong passwords</h3>



<p>The first thing is to use passwords that are really secure. Avoid passwords that you can memorize. In fact, it&#8217;s a bad sign. You should never use your name, date of birth or anything similar that is easy to remember. Ideally, it should be completely random. That is, it should contain letters (both upper and lower case), numbers and other special symbols.</p>



<p>Also, you should not have the same password for a long time. It is best to change it from time to time. This way, you make sure you always have a reliable password. That is to say, that it has not been leaked or has any vulnerability. Although there is no specific date, we can say that if you change it once a month, it is better than once a year.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="661" src="https://www.osradar.com/wp-content/uploads/2023/06/so-1024x661.jpg" alt="" class="wp-image-39164" srcset="https://www.osradar.com/wp-content/uploads/2023/06/so-1024x661.jpg 1024w, https://www.osradar.com/wp-content/uploads/2023/06/so-300x194.jpg 300w, https://www.osradar.com/wp-content/uploads/2023/06/so-768x496.jpg 768w, https://www.osradar.com/wp-content/uploads/2023/06/so-696x449.jpg 696w, https://www.osradar.com/wp-content/uploads/2023/06/so-1068x689.jpg 1068w, https://www.osradar.com/wp-content/uploads/2023/06/so.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>A good idea is to use a password manager. There are many, such as <a href="https://www.lastpass.com/" target="_blank" rel="noreferrer noopener">LastPass</a>, KeePass, 1Password. However, beyond allowing you to store your passwords, many of them also have the function of generating very secure passwords. Some of them can also be configured to alert you when a certain period of time has passed. For example, it can be 4 or 6 months, and <em>force</em> you to change the password to make it totally secure again.</p>



<h3>Enabling two-step authentication</h3>



<p>But beyond the password, something very important to avoid intruders on social networks is to enable two-step authentication. It is an extra security barrier that will prevent you from having problems in case someone manages to find out the password. In order to get in, you would need a second step. That second step is usually a code that you receive by SMS. However, it could also be through a 2FA application. What you&#8217;re really doing is verifying that you&#8217;re the person responsible for that account and that it&#8217;s not an intrusion. This is something that is already present in social networks like Facebook, Instagram, or Twitter.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="612" height="408" src="https://www.osradar.com/wp-content/uploads/2023/06/so2.jpg" alt="" class="wp-image-39165" srcset="https://www.osradar.com/wp-content/uploads/2023/06/so2.jpg 612w, https://www.osradar.com/wp-content/uploads/2023/06/so2-300x200.jpg 300w" sizes="(max-width: 612px) 100vw, 612px" /></figure>



<h3>Protect your devices</h3>



<p>In addition, security must always be present on the devices you use to access social networks. This means that you should not access any website or social network if your smartphone is infected. It does not matter if you are going to enter from the computer or from the mobile. In fact, it is essential in all cases to have the system well protected. It is also good to install a good antivirus like Microsoft Defender on your Windows operating system. In the same way, you have to make sure you have updated your device to avoid vulnerabilities.</p>



<p>When logging in to social networks, always do so from a browser that is protected. Although you can also do it from the official application. Never log in from external links or programs other than the official ones. These programs should also be properly updated. Indeed, they may have some vulnerability and that could be a weak point that attackers can exploit.</p>



<h3>Be careful where you log in</h3>



<p>Another factor to consider is where you log in to your social networks. You should avoid public networks. For example, the Wi-Fi in an airport or shopping mall. In those places you never know who might be behind it or if the network is really reliable. Nor do we know if it has any vulnerabilities or any problems. It is better to use the 4G or 5G mobile network, rather than a Wi-Fi connection that is not secure.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="704" src="https://www.osradar.com/wp-content/uploads/2023/06/so3-1024x704.jpg" alt="" class="wp-image-39166" srcset="https://www.osradar.com/wp-content/uploads/2023/06/so3-1024x704.jpg 1024w, https://www.osradar.com/wp-content/uploads/2023/06/so3-300x206.jpg 300w, https://www.osradar.com/wp-content/uploads/2023/06/so3-768x528.jpg 768w, https://www.osradar.com/wp-content/uploads/2023/06/so3-218x150.jpg 218w, https://www.osradar.com/wp-content/uploads/2023/06/so3-696x479.jpg 696w, https://www.osradar.com/wp-content/uploads/2023/06/so3-1068x734.jpg 1068w, https://www.osradar.com/wp-content/uploads/2023/06/so3.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>However, you can always connect if you use a VPN that encrypts the connection. In this way, security is increased. In addition, there is no risk of your personal information being leaked on this type of public network. Some examples of VPNs are ExpressVPN or NordVPN. They are available for computers and also for mobile devices, both free and for a fee. As for VPN services that are totally free and work really well, here are a couple of examples. I am talking about Cloudflare with its WARP and the Google One VPN, two options to be taken into account. In the second case, you need to be a Google One subscriber to be able to access the VPN service. Otherwise, you will simply not have access.</p>



<p>As you can see, you can take into account these steps to protect your social networks. Use a good password, enable two-step authentication, have your devices protected. In addition to avoiding public networks, are some essential points to keep in mind. You can always detect intruders on social networks.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-protect-your-social-media-accounts-from-hackers/">How to Protect Your Social Media Accounts from Hackers</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-protect-your-social-media-accounts-from-hackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Most hacked passwords are still in use. See how to fix it.</title>
		<link>https://www.osradar.com/most-hacked-passwords-are-still-in-use-see-how-to-fix-it/</link>
					<comments>https://www.osradar.com/most-hacked-passwords-are-still-in-use-see-how-to-fix-it/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Sun, 10 Apr 2022 21:01:00 +0000</pubDate>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=35519</guid>

					<description><![CDATA[<p>Hello! Our first line of defense against a cyber-attack is our passwords. The problem, however, is that your security is not always taken as seriously as it should be. It seems unbelievable, but numerous users are still being naive about this particular issue. In fact, many users have poor password practices in this regard. As [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/most-hacked-passwords-are-still-in-use-see-how-to-fix-it/">Most hacked passwords are still in use. See how to fix it.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Our first line of defense against a cyber-attack is our passwords. The problem, however, is that your security is not always taken as seriously as it should be. It seems unbelievable, but numerous users are still being <em>naive </em>about this particular issue. In fact, many users have poor password practices in this regard. As a result, it is quite common to reuse passwords or use weak passwords that are easy to crack by brute force attacks. For that reason, in this post, we will see how a high percentage of hacked passwords are still in use.</p>



<h2>Hacked passwords increase</h2>



<p>Look, the numbers don&#8217;t lie. A report examined trends related to breached data. In addition, in this report, researchers identified 1.7 billion compromised passwords. We&#8217;re talking about a 15% increase over 2020, and 13.8 billion personally identifiable information records recovered. These numbers come from breaches occurring in the year 2021.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="640" height="598" src="https://www.osradar.com/wp-content/uploads/2022/03/pas.png" alt="" class="wp-image-35520" srcset="https://www.osradar.com/wp-content/uploads/2022/03/pas.png 640w, https://www.osradar.com/wp-content/uploads/2022/03/pas-300x280.png 300w" sizes="(max-width: 640px) 100vw, 640px" /></figure>



<p>Reused passwords have been the main vector for attacks recently. As we warned earlier, this is a recurrent practice. In addition, we have to add the growing threat of digital identity exposure. Similarly, he comments that his annual report shows that users still do not take password security as seriously as they should.</p>



<p>On the other hand, the threat of account appropriation is a factual matter. However, this threat is apparently not implementing general improvements in user cybersecurity hygiene. This careless behavior for individuals is truly alarming. Especially given the  frequency of digital identity fraud.</p>



<p>The government sector was strongly represented in 2021, relating to passwords breached. In that aspect, 611 breaches were discovered containing .gov email addresses. On the other hand, they also found 561,753 credential pairs of email addresses and passwords of government agencies at the international level.</p>



<p>Below is a list of the most common data obtained by attackers:</p>



<ul><li>Names,</li><li>Dates of birth,</li><li>National identification numbers or driver&#8217;s</li><li>Driver&#8217;s licenses,</li><li>Makes and models of vehicles,</li><li>Number of children,</li><li>Smoking status,</li><li>Marital status,</li><li>Estimated income</li><li>Position.</li></ul>



<h2>Reuse of passwords</h2>



<p>This is a constant error. Incredibly, users keep tripping over the same stone over and over again. Today, the average user has dozens of online accounts with a single login. In addition, they often reuse passwords. The report found that 64% of users with multiple compromised passwords reused passwords for multiple accounts. This represents a 4-point increase from the same point in 2021. A worrying statistic is the year-over-year increase in password reuse. This reflects the ease with which cybercriminals can use compromised passwords to compromise multiple accounts. In this regard, it has been observed that:</p>



<ul><li>82% of the reused passwords analyzed consisted of an exact match to a previous password.</li><li>70% of users linked to breaches were still using an exposed password.</li></ul>



<h2>How users create their own passwords</h2>



<p>Undoubtedly, the reuse of passwords for several accounts has an impact on their vulnerability. However, there is also another important factor that makes our passwords more likely to be violated. In fact, the report also identified a strong link with current events when choosing our passwords. On the other hand, there were common elements used in general to generate passwords. Thus, some of these factors are: TV shows, movies, and series of 2021, also music, as well as pop culture and sports.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="370" height="370" src="https://www.osradar.com/wp-content/uploads/2022/03/pass2.png" alt="" class="wp-image-35529" srcset="https://www.osradar.com/wp-content/uploads/2022/03/pass2.png 370w, https://www.osradar.com/wp-content/uploads/2022/03/pass2-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/pass2-150x150.png 150w" sizes="(max-width: 370px) 100vw, 370px" /></figure>



<p>On the other hand, many users and businesses think they are protected against identity fraud by relying on a dark web monitoring service. Unfortunately, one thing they don&#8217;t know is that it can take more than a year before breached passwords reach the dark web for those services to find them.</p>



<h2>Recommendations for protection</h2>



<p>To adequately protect our accounts, we must comply with two essential aspects:</p>



<ul><li>Have a good password to access the service.</li><li>Always enable the service&#8217;s two-step<a href="https://www.osradar.com/2fa-apps-to-protect-account-security/" target="_blank" rel="noreferrer noopener"> authentication.</a></li></ul>



<p>For the former, we must create an alphanumeric password with a length of 12 characters or more. Additionally, it must mix numbers, uppercase, lowercase, and symbols. This way we avoid that our password is in a password dictionary and that it is easily vulnerable. On the other hand, you may not want to generate the password directly. In such a case, you can use any of the dedicated tools. In this case, we recommend <a href="https://passwordsgenerator.net/" target="_blank" rel="noreferrer noopener">Password Generator.</a></p>



<p>Another aspect to consider is to always use <a href="https://www.osradar.com/the-best-password-managers-for-2022/" target="_blank" rel="noreferrer noopener">password managers.</a> These tools allow us to store all users and passwords securely. Additionally, they encrypt the contained data, and access them through a master key that is the only one you must remember.</p>



<p>Let&#8217;s talk a bit about two-step authentication. In fact, nowadays most online services, prestigious websites, etc., have systems to configure the second authentication factor. On the other hand, if you are going to set up two-factor authentication, you must do it with an authenticator application. It is also advisable to use a USB device for authentication. On the other hand, it is not recommended to use SMS as a second authentication factor. Indeed, they could do a SIM Swapping and clone our SIM to steal this key sent to us.</p>



<h2>Conclusion</h2>



<p>On the other hand, staying safe is fairly easy with the right tools. We therefore recommend using a key manager such as KeePass or Bitwarden. It is also advisable to activate two-step authentication in your services, but without using SMS as a second authentication factor.</p>



<p>We also recommend the use of password managers. Certainly, there are many on the market. However, LastPass is my personal choice. It is indeed a very complete, functional and didactic service. Moreover, its free version is more than enough for a home user.</p>



<p>Very well, in this way we have seen that most hacked passwords are still in use. We also learned what measures to take to avoid this risky situation. Bye! </p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/most-hacked-passwords-are-still-in-use-see-how-to-fix-it/">Most hacked passwords are still in use. See how to fix it.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/most-hacked-passwords-are-still-in-use-see-how-to-fix-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Massive attack: Hackers access Microsoft source code</title>
		<link>https://www.osradar.com/massive-attack-hackers-access-microsoft-source-code/</link>
					<comments>https://www.osradar.com/massive-attack-hackers-access-microsoft-source-code/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Fri, 01 Jan 2021 08:00:00 +0000</pubDate>
				<category><![CDATA[Windows]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[source code]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=27271</guid>

					<description><![CDATA[<p>The 2020 surprises until the end. As an example of this, the massive attack on SolarWinds software had great consequences. Among them, the attackers accessed Microsoft&#8217;s source code. The company revealed the process of the attack on its systems. In this sense, it stated that they found irregularities in a &#8220;small number of internal accounts&#8221;. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/massive-attack-hackers-access-microsoft-source-code/">Massive attack: Hackers access Microsoft source code</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The 2020 surprises until the end. As an example of this, the massive attack on SolarWinds software had great consequences. Among them, the attackers accessed Microsoft&#8217;s source code.</p>



<p>The company revealed the process of the attack on its systems. In this sense, it stated that they found irregularities in a &#8220;small number of internal accounts&#8221;. And that one of them &#8220;had been used to view [the company&#8217;s] source code in various source code repositories. In this way, the hackers had access to Microsoft&#8217;s source code.</p>



<h2>Attack on the source code: worldwide</h2>



<p><a href="https://www.solarwinds.com/en/" target="_blank" rel="noreferrer noopener">SolarWinds</a> is a US company. Its main objective is to develop software for companies. They collaborate in the administration of their networks, systems and information technology infrastructure. Previously, the company suffered a massive attack. Specifically in early December. It is important to note that investigations link Russia to the attack. In this sense, the affected companies belong to different influential countries. However, Russia is off that list.</p>



<p>Likewise, Microsoft carried out a map with telemetry from the Defender Anti-Virus software to determine the affected countries. The United States stands out among them. However, Microsoft identified companies and institutions in Canada, Mexico, Belgium, Spain, the United Kingdom, Israel and the United Arab Emirates.</p>



<h2>Other important data</h2>



<p>On the other hand, Microsoft assured that it seeks to be transparent in its research. Consequently, the company named the research as Solorigate. This research yielded important findings. For example: the attack preserved customer data. In addition, there is no indication that the attack was used to affect third parties from Microsoft systems.</p>



<p>Finally, the company claimed that they infiltrated their systems &#8220;beyond the presence of SolarWinds&#8217; malicious code&#8221;. All these findings alert the Microsoft community regarding the security of their systems. And they invite the company to reinforce its security to ensure the safety of its customers and their data.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/massive-attack-hackers-access-microsoft-source-code/">Massive attack: Hackers access Microsoft source code</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/massive-attack-hackers-access-microsoft-source-code/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>This driver shuts down the antivirus and installs ransomware in Windows</title>
		<link>https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/</link>
					<comments>https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/#respond</comments>
		
		<dc:creator><![CDATA[Mel]]></dc:creator>
		<pubDate>Sat, 08 Feb 2020 00:54:15 +0000</pubDate>
				<category><![CDATA[Tools]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[robbinhood]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://windowsmen.com/?p=179</guid>

					<description><![CDATA[<p>Hi, how are you? It&#8217;s amazing how hackers refine their techniques to attack pcs. Additionally, they continue to seek to breach user and operating system security measures. So we will see how this driver shuts down the antivirus and installs ransomware in Windows. Specifically, this threatens the vulnerability of a legitimate Gigabyte driver to disable [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/">This driver shuts down the antivirus and installs ransomware in Windows</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hi, how are you? It&#8217;s amazing how hackers refine their techniques to attack pcs. Additionally, they continue to seek to breach user and operating system security measures.  So we will see how this driver shuts down the antivirus and installs ransomware in  Windows. Specifically, this threatens the vulnerability of a legitimate <a rel="noreferrer noopener" aria-label="Gigabyte (opens in a new tab)" href="https://www.gigabyte.com/" target="_blank">Gigabyte</a> driver to disable the antivirus and install complex ransomware on the pc. Before we continue, let&#8217;s see what ransomware is. This is a malware program that infects the computer. Additionally, it displays messages that require the payment of money to restore the system&#8217;s functionality. </p>



<p>It acts by blocking the device remotely, to encrypt the files taking away the control of all the information and data stored. The virus launches a pop-up window asking for the payment of a ransom. This payment is usually made in virtual currency. On the other hand, this software can be installed through misleading links included in an email, instant message or website. Windows.</p>



<h2>How ransomware RobbinHood works</h2>



<p>As mentioned above, this threat acts through a Gigabyte company driver (gdrv.sys). This has a security flaw, so the exploit included with ransomware allows the attacker to disable the antivirus. It is not even necessary to have a Gigabyte device installed. Finally, attackers use the vulnerability of the genuine driver, to install a second driver created by them without a digital signature. The purpose of this second driver is to disable the antivirus. Consequently, ransomware can be installed without any problem. </p>



<figure class="wp-block-image size-large td-caption-align-https://windowsmen.com/wp-content/uploads/2020/02/hacker-2300772_1280.jpg"><img src="https://windowsmen.com/wp-content/uploads/2020/02/hacker-2300772_1280-1024x682.jpg" alt="" class="wp-image-180"/></figure>



<p>With the antivirus turned off, ransomware installs itself on the pc, takes full control and encrypts all data present on the hard disk. It then displays a message like the one below, asking to pay for the data or we won&#8217;t be able to recover it.</p>



<figure class="wp-block-image size-large"><img src="https://windowsmen.com/wp-content/uploads/2020/02/ram.jpg" alt="Message from ransomware requesting ransom for the files" class="wp-image-181"/><figcaption>Message from ransomware requesting ransom for the files</figcaption></figure>



<p>The exploit that takes advantage of the security flaw is hidden in a file called Steel.exe. When executed, a file is extracted with ransomware (ROBNR.EXE). In addition to the two drivers, the vulnerable one (signed by Gigabyte) and the one developed by the hackers. As mentioned above, it is not necessary to have any Gigabyte components on the computer. The ransomware itself will install the Gigabyte driver on our PC and carry out the attack. The ransomware asks to pay a Bitcoin money within the next 4 days. If not, the cost will increase to $10,000 per day over the next 6 days. Eventually, the keys will be removed from the server and the data will be lost forever.</p>



<p>According to computer experts, this is the first time that ransomware uses a reliable third-party driver to attack the Windows kernel. In addition to loading a second malicious unsigned driver. And finally, disabling the antivirus directly from the operating system kernel.</p>



<h2>Gigabyte knew about the bug, but she didn&#8217;t fix it.</h2>



<p>In a supreme display of irresponsibility, the Gigabyte company has known about this mistake since December 2018. However, the manufacturer decided to abandon driver support instead of fixing it. Consequently, users were exposed to this security problem until the attack happened. Security experts claim that there is no way to defend against this ransomware. That is, even with a good antivirus and all the security patches installed, the attack is inevitable.</p>



<figure class="wp-block-image size-large td-caption-align-https://windowsmen.com/wp-content/uploads/2020/02/man-4190930_1280.jpg"><img src="https://windowsmen.com/wp-content/uploads/2020/02/man-4190930_1280-1024x586.jpg" alt="" class="wp-image-183"/></figure>



<p>As always, the best way to protect yourself against hackers is to use common sense. That is, avoid downloading and using illegal programs. Also, be wary of an unknown e-mail. It is also healthy to check the websites you visit. On the other hand, it is advisable to keep your data backed up in the cloud or on external hard drives. In this way, you can avoid falling into threats. Finally, we have seen how this driver shuts down the antivirus and installs ransomware in WindowsThis is all for now before I go I invite you to see our post about repairing the <a rel="noreferrer noopener" aria-label=" (opens in a new tab)" href="https://windowsmen.com/the-windows-10-search-bar-doesnt-work-how-to-fix-it/" target="_blank">search bar </a>in Windows 10.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/">This driver shuts down the antivirus and installs ransomware in Windows</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/this-driver-shuts-down-the-antivirus-and-installs-ransomware-in-windows/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
