There's a suspicious virus prowling in Indian cyberspace | HT Tech

There's a suspicious virus prowling in Indian cyberspace

The Indian cyberspace has been hit by the malicious activity of a potentially threatening virus which can execute phishing attacks to negatively alter users' personal data, country's lead cyber security agency has said.

By:PTI
| Updated on: May 14 2015, 15:34 IST
image caption

The Indian cyberspace has been hit by the malicious activity of a potentially threatening virus which can execute phishing attacks to negatively alter users' personal data, country's lead cyber security agency has said.

The anti-cyber attacks agency Computer Emergency Response Team of India (CERT-In), has detected that the virus identified as 'Bioazih' which can acquire as many as five aliases to hide its evil designs and 'can execute commands remotely, upload data, download and execute files' in an unauthorsied manner.

You may be interested in

MobilesTablets Laptops
27% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
Vivo X100 Pro 5G
  • Asteroid Black
  • 16 GB RAM
  • 512 GB Storage
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage

'It has been reported that a new malware having backdoor functionalities dubbed as 'Bioazih' is spreading.

Also read
Looking for a smartphone? To check mobile finder click here.

'The malware propagates by means of spear phishing emails containing attached malicious document exploiting Microsoft Office vulnerability or the Remote Access Trojan (RAT) may infect the targeted users system by means of malware dropper also,' CERT-In said in its latest advisory to internet users.

The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet domain.

The virus' threat is critical as it belongs to the deadly 'Trojan' family and a 'spear phishing' attack is a clever activity done by an infectious malware to hit a healthy system stealthily.

The agency said the malware makes use of different techniques to maintain anonymity of its command and control servers or it sets up virtual private networks to host their servers in order to hide their actual locations.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 14 May, 15:30 IST
NEXT ARTICLE BEGINS