This is how you can protect yourself against this new Trojan that can affect users in several ways

A new threat puts users’ security at risk. This is a new problem for which we must find a solution in order to avoid putting our devices at risk. We are talking about Parasite HTTP, a remote access Trojan (RAT) and an updated version of an already identified banking Trojan. It uses phishing campaigns targeting a wide variety of sectors. Its goal is the same: stealing users’ banking credentials.

Parasite HTTP, a new Trojan

According to Proofpoint researchers, this new malware is being distributed via emails. Said emails come with a Microsoft Word attachment containing hidden malicious macros that would download the RAT from a remote site.

As we have mentioned, this new banking Trojan has been dubbed Parasite HTTP. It has features that make it new, like anti-emulation, sandbox identification, and anti-debugging, to name a few.

The upgraded RAT is an advanced version of a previously detected banking Trojan. Additionally, according to researchers, Parasite HTTP’s modular structure adds newer modules once it compromises a device successfully.

We have to mention that Parasite HTTP is written in C language and has a size of only 49 KB. The malware communicates in an encrypted format and is able to bypass firewalls.

The malware works with a series of plugins including browser password recovery, FTP password recovery, user management and email password recovery.

This is definitely a new malware that can compromise a device’s proper functioning and the security of any user. Luckily, we can put an end to this issue, avoiding having any trouble.

How to avoid being a victim of this malware

As we have said, this new malware is distributed via emails, therefore we need to pay great attention to every email we receive. Doing so will protect us against Parasite HTTP and other similar malware.

Phishing is widely used by cybercriminals to attack users. It is important to protect out email accounts. In this case, we have seen how a Word document is used as a way for the malware to get into our PC. We must avoid opening similar emails. The best option is to ignore the email.

Additionally, having security programs and tools is essential in order to protect ourselves against malware and any other security threat. Additionally, these programs must be kept up to date. Sometimes there are vulnerabilities that are fixed with security patches. These updates let us address recent security issues while keeping our devices secure.

However, common sense is really important. We have to pay attention to every email or link we get, every software we download and every webpage we visit.


Leave a Reply

Your email address will not be published. Required fields are marked *