Hacker News has an article on how Hackers use a method of installing their

software onto your systems.

1. If you notice the problem is when the user opens an attachment or link (URL) in their web browser(Firefox – Microsoft Edge, or Google chrome among the most used browsers)

2. Then the browser decodes the javacode (which is unintelligible by most people) this leads to a Website (criminal owns this website)

3. The Criminal website now downloads a malicious  software (Malware) onto your machine.

4. Here it depends on what the objective of the criminal hacker is – make money? destroy data?


As HackerNews notes here:

Microsoft 365 Defender Threat Intelligence Team, in a new report published Thursday, disclosed that it identified infiltrations distributing the Mekotio banking Trojan, backdoors such as AsyncRAT and NjRAT, and the infamous TrickBot malware. The multi-staged attacks — dubbed ISOMorph — were also publicly documented by Menlo Security in July 2021.

various malware was installed at different times in the past.

there is also software that can steak credentials and send that info back to the command server run by the criminal hackers.  this way when you are entering your banking information that info eill be stolen and can be used against you.

How can you stay ahead of the game?

So the bottom line is?

Do what you can to defend your computers so they do not receive the initial malware, because once it is on your system and running if your system has a vulnerability then it is over.

So patch/update your systems, run anti-virus, and browser helper programs against ads as well as privacy to cover as many bases as possible.

Get my book “Too Late You’re Hacked” to start working on a systemic method of defense!


By zafirt

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.