![]() |
![]() |
|
|||
|
|
Personal Liberty Bob Livingston provides you with a conservative, Christian view on life. Helping you live free in an unfree world. Delivering news on improving you health, boosting your wealth, and protecting your civil liberties." |
![]() |
Thread Tools | Search this Thread | Rate Thread |
#1
|
|||
|
|||
‘Ratters’ Troll The Internet Looking For ‘Slaves’ And Stealing Compromising Informati
03.14.13 09:01 PM
Hackers are using software called remote administration tools (RATs) to infect computers, steal intimate photos, watch people through their webcams and listen to conversations. These hackers are called ratters, and they share their techniques and the photos and information they steal from computers with other ratters in online forums. For some, it’s a game of cat and mouse. For others, it’s a way to find sexually explicit photos and toy with their victims, whom ratters call their slaves. The website arstechnica.com explained in an article last week how ratters can remotely turn on webcams and surreptitiously watch everything the webcam can see and listen to everything the computer’s microphone can pick up. The RATs allow the hackers to look through computer files in search of photos and other information. They can also — and often do — use the computer’s software to startle their victims. For instance, a RAT can activate Microsoft’s text-to-speech software on the remote system so that it reads aloud a string of text. It can open a chat window and play notes from a musical instrument or make sounds at a specific frequency. According to arstechnica.com, RATs can be entirely legitimate. Security companies have used them to help find and retrieve stolen laptops, for instance, and no one objects to similar remote login software such as LogMeIn. The developers behind RAT software generally describe their products as nothing more than tools which can be used for good and ill. And yet some tools have features that make them look a lot like they’re built with lawlessness in mind.Some of the hackers’ RAT attacks are vicious, writes malwarebytes.org. Some are just “fun functions” used to mess with the system (and minds) of the victim.” Among the nastier things a RAT can do are:
In drive-by attacks, hackers embed malicious script in Web pages that activate when you visit the page. The script exploits vulnerabilities in the computer’s system software and implants and executes malware without the user’s knowledge. Warez downloads, or the downloading of illegal/cracked software, can often lead to also downloading something the user didn’t bargain for: malware tools that give the hackers access to your computer. Social networking sites are used by hackers who send a link to a group of people all at once with the hope that one or more click on it. Once they get into people’s computers, ratters gleefully share their exploits in online hacker forums. According to arstechnica.com, one poster said he had already archived 200GB of webcam material from his slaves. “Mostly I pick up the best bits (funny parts, the ‘good’ [sexual] stuff) and categorize them (name, address, passwords etc.), just for funsake,” he wrote. “For me I don’t have the feeling of doing something perverted, it’s more or less a game, cat and mouse game, with all the bonuses included. The weirdest thing is, when I see the person you’ve been spying on in real life, I’ve had that a couple of times, it just makes me giggle, especially if it’s someone with an uber-weird-nasty habit.”To avoid being hacked by ratters, arstechnica.com advises you “take the same precautions that apply to most malware: use a solid anti-malware program, keep your operating system updated, and make sure plugins (especially Flash and Java) aren’t out of date. Don’t visit dodgy forums or buy dodgy items, don’t click dodgy attachments in e-mail, and don’t download dodgy torrents. Such steps won’t stop every attack, but they will foil many casual users looking to add a few more slaves to their collections.” ![]() http://personalliberty.com/2013/03/1...g-information/ |