This type of malicious software can infect your computer without a single click
Last updated on September 6, 2021
Java is a general-purpose computer programming language developed by Sun Microsystems (now owned by Oracle Corporation).
see the content of the website you’re on
perform various actions (example: fill out a form or download a file from a website)
see the online ads (banners) on that website, etc.
Because online browsing is one of the strongest online habits that users have, cyber criminals target exactly that. Online attackersfrequently redirect users to compromised websites. These can be either created by them or they can be legitimate websites they’ve hacked into. According to Sophos, “82% of malicious sites are hacked legitimate sites”! Source: Naked Security blog by Sophos What defines an infected website is that:
cyber attackers have loaded malicious content or malicious software from a remote server.
You, as a user, unwittingly browse the compromised website.
They are executed through your browser, triggering the malware infection.
The exploit kit used in the attack (hosted on the exploit server) probes your system for software vulnerabilities.
Once the exploit finds the vulnerability, it uses it to gain access to your PC’s functions.
This grants the exploit kit the right to execute code and download additional files from the Internet with administrator privileges.
In the next step, malware will be downloaded onto the PC and executed.
The malware can perform damaging functions on the PC. It can also collect information from the infected system and send it to the servers controlled by cyber criminals.
Unfortunately, once a .JS file has been saved to your hard disk, Windows will run it by default outside your browser, using a system component called WSH, short for Windows Script Host. A standard system program called WScript.exe (or its companion, CScript.exe, for command-line scripts with no graphical interface) will load your script, feed it into WSH, and then run it with all the power that a regular executable program would enjoy.
Source: Naked Security blog by Sophos
7. Browser add-ons and plugins – these can be either infected or they can load external content loaded with malware from external sources.
Source: IT Portal Six months later, a new ransomware strain called RAA appeared. It featured a dumfounding feature:
Never download and opening attachments in spam emails
Keep away from suspicious websites.
And if you want to go the extra mile, here’s a setting you can adjust in your Chrome browser:
Click the Chrome menu Chrome menu in the top right hand corner of your browser
Click Show advanced settings
Under the “Privacy” section, click the Content settings button.
If malware attacks such as the ones I mentioned ever made you feel helpless, there’s no reason to feel this way. The entire process may be complicated for cyber criminals, but there are plenty of protection methods available. You should be unwilling to succumb to fear and adopt the “there’s nothing I can do about it” attitude. Educate yourself, build a multi-layered security system and you’ll be safer than most Internet users will ever be. You’re not alone in this! Our team as well as many other security researchers and vendors are working constantly to build a safer web. Get on board!
The easy way to protect yourself against malware
Here's 1 month of Heimdal™ Threat Prevention Home, on the house!
Use it to:
Block malicious websites and servers from infecting your PCAuto-update your software and close security gapsKeep your financial and other confidential details safe
As a Security Specialist at Heimdal Security, Andra has made it her mission to help users understand how cyber security works and why it’s essential for any Internet user in the world. Using her background in PR and communication, she singles out relevant subjects and extracts actionable market data and key examples to illustrate them.