Breaking News

LG Electronics Introduces World’s First Native 1000Hz Full HD Gaming Monitor Transcend to Showcase Next-Gen Storage Solutions at COMPUTEX 2026 Giga Computing Enhances Cloud Storage Solutions with AMD EPYC 8005 Server CPU SAMA S50 Rethinks Compact ATX Cases addlink’s 2026 Virtual Showcase

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Cisco Identifies Virus That Kills Off PCs

Cisco Identifies Virus That Kills Off PCs

PC components May 5,2015 0

Researchers have discovered "Rombertik," a computer virus that tries to avoid detection by making the computer it infects unusable. Once it's triggered, the virus deletes key files on a computer, making it constantly restart. On Windows machines where it goes unnoticed, the malware steals login data and other confidential information.

According to Talos, Romberik is a complex piece of malware that is designed to hook into the user’s browser to read credentials and other sensitive information for exfiltration to an attacker controlled server.

Rombertik has been identified to propagate via spam and phishing messages sent to would-be victims. Like other spam and phishing campaigns, attackers use social engineering tactics to entice users to download, unzip, and open the attachments that ultimately result in the user’s compromise.

The process by which Rombertik compromises the target system is a fairly complex with anti-analysis checks in place to prevent static and dynamic analysis. Upon execution, Rombertik will stall and then run through a first set of anti-analysis checks to see if it is running within a sandbox. Once these checks are complete, Rombertik will proceed to decrypt and install itself on the victims computer to maintain persistence. After installation, it will then launch a second copy of itself and overwrite the second copy with the malware’s core functionality. Before Rombertik begins the process of spying on users, Rombertik will perform once last check to ensure it is not being analyzed in memory. If this check fails, Rombertik will attempt to destroy the Master Boot Record and restart the computer to render it unusable.

The malware "indiscriminately" steals data entered by victims on any website, the researchers said.

Good security practices, such as making sure anti-virus software is installed and kept up-to-date, not clicking on attachments from unknown senders, and ensuring robust security policies are in place for email (such as blocking certain attachment types) can go a long way when it comes to protecting users.

Tags: Virus
Previous Post
Samsung Delivers Faster Speeds With New PRO Plus and EVO Plus Memory Cards
Next Post
Intel Xeon E7 v3 Processor Series Debuts

Related Posts

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

  • Researchers Identify iOS Espionage App

  • Researchers Identify New iOS Vulnerability

  • Dropbox, WordPress Used To Spread Malware

  • Microsoft Says Viruses Are Back On The Rise

  • First Targeted Attack Utilising Malware for Android Devices Reported

  • Cyber Attack Targets Nato, Government Websites

  • Stuxnet Roots Found Back in 2005

Latest News

LG Electronics Introduces World’s First Native 1000Hz Full HD Gaming Monitor
Consumer Electronics

LG Electronics Introduces World’s First Native 1000Hz Full HD Gaming Monitor

Transcend to Showcase Next-Gen Storage Solutions at COMPUTEX 2026
PC components

Transcend to Showcase Next-Gen Storage Solutions at COMPUTEX 2026

Giga Computing Enhances Cloud Storage Solutions with AMD EPYC 8005 Server CPU
Enterprise & IT

Giga Computing Enhances Cloud Storage Solutions with AMD EPYC 8005 Server CPU

SAMA S50 Rethinks Compact ATX Cases
Cooling Systems

SAMA S50 Rethinks Compact ATX Cases

addlink’s 2026 Virtual Showcase
PC components

addlink’s 2026 Virtual Showcase

Popular Reviews

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Endorfy Thock V2 Wireless Keyboard

Endorfy Thock V2 Wireless Keyboard

Crucial T710 2TB NVME SSD

Crucial T710 2TB NVME SSD

JSAUX 65Wh Rog Ally Battery

JSAUX 65Wh Rog Ally Battery

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed