Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Privacy › Hackers Making People Do Good

    Hackers Making People Do Good

    By Rishabh ShandilyaDecember 4, 2022
    Facebook Twitter Reddit LinkedIn
    p bcxt

    Cybersecurity experts have lately discovered a novel kind of malware that entails a series of altruistic activities for the benefit of the sufferers’ information. Data theft is made worse by self-righteous advice on how to recover your information by performing a slew of selfless “good acts.” Malware research company CloudSEK reportedly discovered the malware, called GoodWill. Encryption of data, such as images, emails, as well as other data, is common in malware, which tries to extract pay from sufferers in exchange for the master password.

    “Quite Unique Requirements”

    Hackers

    To thwart the real-time investigation, the virus employs AES encryption and a 722.45-second sleep clock. The gang is serious when it says it has “quite unique requirements,” as stated in the security advisory. It’s unlike like previous cyberattacks since the organization operating GoodWill instead of demanding a payment demands that the people afflicted carry out three positive deeds, video them, and then share those on social media to inspire everyone to do the same. Meanwhile, they were putting their victims’ heads under a virtual pistol. In accordance with CloudSEK, the IP address of the hacking gang was located in Mumbai, India.

    An explanation of the group’s motivations is shown to those who have been attacked. As stated in the article, they are not “famished for cash.” The goal is to teach individuals “a painful lesson to constantly support poor and needy people,” rather than punish them.

    Hackers

    According to reports, the initial responsibility assigned to sufferers is to donate clothes and comforters to those in need in their communities. Following their dinner at a Nando, KFC, or Fast Food restaurant, individuals should pose for a picture with 5 children under the age of 13 afterward (the reason for making a strange man taking several kids to a fast-food restaurant is still up in the air). It is imperative that the survivors give the highest amount possible to a patient’s medical expenses.

    Have You Read: Twitter Required To Pony Up 150 Million To In Penalties To Use Personal Data For Ads

    This might be a quagmire in the United States because you don’t know what your coverage will reimburse. Aside from that, it appears difficult to solve this problem. The directions, on the other hand, direct them to travel to a clinic and begin conversing with patients. It’s only logical that they’d want to document the exchange. In this conversation, the perpetrator should reassure them that they have nothing to fear. “Maximum portion of needed quantity” is what they are told to do next. They must deliver the audiotape to the attackers in order to complete the process, but they are not required to provide evidence of money.

    Hackers

    Utilizing a picture frame given by the attackers, the sufferers should capture all of these coerced behaviors and share them on Instagram, Facebook, or WhatsApp. According to their safety alert, “It really doesn’t price you much, but cares for mankind.” However, it’s not obvious who the hacking organization is addressing or how it determines the skills of the people they attack. This is all very sanctimonious, but surely there are better methods of inspiring individuals without interfering with their private information?

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Rishabh Shandilya

    Related Posts

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024

    Navigating the Waters: Best Practices for Phishing Testing in 2024

    February 19, 2024
    Lists You May Like

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.