Get yourself introduced with the world’s yet most advance and sophisticated malware that has been discovered by Kaspersky and It has infected many systems in more than 31 countries . Instead of attacking the common users or consumers, it targets the government institutions , oil and gas companies , embassies and research companies and because of this behavior sometimes it is assumed as a sponsored attack or campaign to run a new form of surveillance or to collect foreign data. Careto was live for many years until it was unmasked and then it’s centralized server went offline , but still there are many possibilities of Careto that can be run privately for any planned attack .
Careto was written by highly professional people which consist of a sophisticated malware, a rootkit, a boot kit , MacOS X, some version of Linux as well as mobile platform of iOS and android . Which mean it can act according to the victims’ system architecture.
CARETO STRING |
How does Careto work?
It consists of phishing email with a link to malicious website , the malicious website contains many exploits which inject according to the victim’s OS architecture as the malware has been already designed for dynamic platform. When an user click on the link , then the malcious website inject the exploits into the user’s system and after successfully injecting , it redirect the user to the original website that was stated in the phished email.
It capture nearly 50 file types including doc , pdf, encryption key, server SSH key and RDP files which are used to identify the users and build remote desktop connection , and many more file types .
This malware is highly modular that it can interact with almost all communication channels , it support plugins as well as it can also intercept with flash players .
The game of malware, virus and other threats will never end as each and every hacker and criminals builds new and new type of threats and many people will be victims till it is discovered by the security researcher . So it is better to protect you system and device from day to day cyber threats .
It is very important to Install a security software in your system .
Avoid attachment from unknown senders
Download music, videos, apps, eBooks from only official and trusted sources .
Check the link sent by anyone and think twice before you click .
Stay updated with cyber threats , virus, malware by subscribing to security blogs .
If you find any unknown weird activates in your system or in someone system then report it to security researcher , it may help them to discover new threats .