Se afișează postările cu eticheta virus. Afișați toate postările
Se afișează postările cu eticheta virus. Afișați toate postările

vineri, 29 decembrie 2017

Malware analysis and investigation services

Alexandru Anghelus – Malware analyst & investigator


Security of your personal data is very important.
Also sensitive Company data is extremely important.
If you’ve got a file and it looks suspicious, do not open it.
The .zip, .exe, .rtf, .doc, .htm, .rar … etc files can be infected and personal data may become public or can be used against you.
With my analysis services you can remove that insecurity!
Analyzing a file can take a few minutes or even hours.
Investigating the ones found and drawing up the report may take longer, depending on the infected file.
Tracking the hacker may be impossible or may take several days.
Chances of success in discovering the infected file are 99%.
Full report services can help identify the reason, the target and whether it is a direct or random attack.
At the following address you can find some of my work in the field.

I am malware analyst and investigator.
With my skills everyone can have a clear vision about some suspicios files or emails that they have on pc.
I am the founder of Professional Defence Community, a 7 years cybersecurity website.
Web Pentesting.
Malware analysis.
Malware investigator.


Freelancer services websites:
https://www.fiverr.com/alexmalware
https://www.upwork.com/freelancers/~01ec95393b79dc2f6b
https://www.freelancer.com/u/alexpdc

Social media:
https://www.facebook.com/alexarchitect
https://www.linkedin.com/in/anghelus-alexandru/
h**ps://twitter.com/AlexProdefence

Contact:
email: info@prodefence[.]org

marți, 21 noiembrie 2017

Are you a lucky cybercrime victim?

Many Internet users download certain programs, even if they know they are illegal or even dangerous. Without clear statistics, I tend to think that only 5% of them know how to protect themselves so they will not become victims of hackers.
Sometimes, victims quickly realize that they have something dangerous on the computer, sometimes they do not know what is happening beyond the screen. A great deal of support comes from the installed antivirus, if it is upgraded, but it also often does not see the infected file.
 I’m one of those who deliberately download infected files to analyze, learn, and discover hacking news, thousands of files. Since 2008, I have seen many viruses, more or less dangerous, stealing and leaving, staying and registering, remaining and using the computer of the victim.
In general, the processing, transmission and shock of hacking information is done through a host, email or IP, so the hacker does not have direct connection with the victim.
E.g:
Remote Administration Tool – Remote computer control, and this is done with a host, whose IP connects to the victim.
Keylogger – The keyboard is stored on the victim’s computer and then sent to a host or email.
Password Stealer – Data stored in your computer is collected and sent to a host or email.
Silent miner – The computer becomes a hidden worker and is permanently connected to a host to do his job.
Botnet – The victim’s computer is a slave waiting for the hacker’s commands, and is connected to a host to be controlled.
What many do not know is that all of these connections are not permanent. They can be blocked, reported, expired, deleted, etc. More specifically, the virus exists on the Internet, it is active, but everything it does is useless, because it does not have the hacker connection anymore.
And for everybody to understand, I’ll explain. The virus accesses the computer, steals everything he knows, but sends all the data to an address that does not exist anymore, and that’s a good thing for… YOU!
So you’re a lucky victim?

joi, 2 august 2012

Ανακαλύφθηκε νέος ιός που δεν μπορεί να αφαιρεθεί!

Posted Image

Τρομακτικά νέα ακόμα και για τον πιο έξυπνο κομπιουτεράκια.

Όλοι οι ιοί προκαλούν προβλήματα, μερικοί είναι επικίνδυνοι και έχουν ένα κοινό χαρακτηριστικό: μπορούν να αφαιρεθούν μετά απο το format του υπολογιστή μας.

Δυστυχώς όμως υπάρχουν και ιοί που ούτε μετά απο format ή αλλαγή του σκληρού δίσκου μπορούν να αφαιρεθούν.

Στο συνέδριο ασφαλείας Black Hat στο Λας Βέγκας την περασμένη βδομάδα παρουσιάστηκε πως κάποιο λογισμικό θα μπορούσε να κρυφτεί στο BIOS του υπολογιστή.
Το λογισμικό αυτό θα μπορεί να έχει απομακρυσμένη πρόσβαση μέσω του ιντερνέτ.

Το εργαλείο αυτό είναι εγκατεστημένο στο BIOS τσιπ της μητρικής κάρτας του υπολογιστή. Αυτό σημαίνει ότι με το πάτημα του κουμπιού για την έναρξη του υπογολογιστή το λογισμικό μπορεί να τρέξει.

Διαβάστε περισσότερα