December 1, 2020

Jupyter, the new Trojan that steals all your passwords

Jupyter leaves doors open for future attacks.

Jupyter leaves doors open for future attacks.

The cybersecurity company Panda Security has warned about the growing activity of Jupyter, a Trojan-type ‘malware’ that is periodically updated to create back doors in the systems and whose objective is steal all stored passwords on the device keychain.

Jupyter, created by cybercriminals of Russian origin, was ‘hibernating’ since the summer, but in recent weeks has infected “thousands of electronic devices around the world”, according to Panda in a statement.

The ‘malware’, Once installed on a computer or mobile, it accesses all the users and passwords that are stored in Chrome and Firefox browsers on that device. In this way, it is possible to obtain access to the current account, credit cards, online stores in which you have made purchases, email and social networks of your victims.

This Trojan is updated every time antivirus developers progress in its detection. That is, every time the legitimate industry takes steps to detect this ‘malware’, its creators update it to go unnoticed.

The creators of Jupyter they released the latest update to their code in the second week of November. However, there have been other periods of the year with more maintenance activity, such as during the month of May, when cybercriminals released up to nine ‘patches’ to bypass security systems.

“Just as all legitimate companies are releasing ‘software’ updates to update operating systems or apps, the hackers who have developed Jupyter are also releasing theirs,” said Hervé Lambert, Global Consumer Operations Manager at Panda Security .

The greatest risk of this new cyber threat is that, in addition to collecting data, its code is designed to leave back doors open on the systems it infects.

This threat is due to the fact that, in addition to stealing access credentials to social networks, email or even online stores and digital banking, cybercriminals can leave the computer ‘waiting’ for them so that they can end the theft directly from the computer of their victims .

In this way, attackers can easily access a victim’s computer, collect all the information they have stolen and, incidentally, install more ‘malware’ with which to mine cryptocurrencies or infect other devices with the same virus.


Source link