Bonzibuddy’s story, Windows camouflaged spyware

If you used a computer in the late 90s or early 2000s, you will surely remember Clippy in Office 97 OA Rover, that animated puppy that appeared in the Windows XP search engine. They were times of sympathetic, colorful, a bit clumsy virtual assistants … and, in general, harmless. But not everyone worked with the same intentions. In The new episode of ‘Xataka presents’ of our YouTube channel We review the curious case of Bonzibuddythat purple monkey -shaped assistant who promised to help you with everyday tasks as you released jokes and read you Correos. “An alleged virtual assistant in the form of a purple monkey who promised to make your life easier,” tell our classmates. But after that harmless appearance something quite different was hidden: “steal information and send it to the Bonzi Software database.” And that was only the beginning: deceptive ads, alterations in the system configuration and a payment version that did not solve precisely anything. “When installing a back door, Bonzi Buddy allowed other malicious programs, such as viruses, will infiltrate the system“, is explained in the video.” In 2014, a YouTuber brought it back in a video where Windows XP destroyed with malicious programs. And suddenly, Bonzi Buddy was famous again, “our teammates point out. What was Bonzibuddy? What happened to its creators? Why in 2014 did it circulate online thanks to a youtuber that decided to test it in an environment full of malware? It is a story that puts many questions on the table. And that says a lot about the time, about how we saw technology … and about what Vulnerable that we were when they introduced us something as fun and harmless. If you want to know how far this peculiar assistant came, you have all the details in our video. Today we have better defenses against malware, since Windows Defender to him Antivirus integrated into macOS, Without forgetting the tools of third parties that work quite effectively. At the time, Bonzibuddy had it much easier to sneak into computers. Its history is still a valid reminder: you never have to lower your guard. Sometimes, malware comes with a smile. Images | Screen capture In Xataka | In 1995, Microsoft believed to have found a way to humanize Windows: it called Bob and ended up being a loud failure In Xataka | Public administrations turn the tortilla: Midni promises to be another success with Midgt and my citizen folder

This app was passed through a file administrator, but it was a North Korean spyware

Download applications from the official store of our Android device is the safest option. However, that does not mean that it is free of risks. Despite Google’s efforts to improve the security of Play Store, every so often some threat is filtered. This time it has been a North Korean spyware, which has managed to sneak out without raising suspicions. A spyware disguised as file administrator. Cybercriminals have perfected their tactics for camouflating malware within applications that seem completely harmless. Many of them even work normally, but in the background they execute malicious actions. File Manager, as his name suggests, was presented as a Android file manager, but actually hid something very different. According to the cybersecurity firm Lookout, File Manager hid a malware known as Kospy, which they believe with “high confidence” that was linked to North Korea. They have reached this conclusion, among other things, discovering that the malicious application uses domain names and IP addresses that were previously identified as present command and control infrastructures used by the groups of North Korean Cadincommers APT37 and APT43. What could the malicious app? Experts warn that this application collected a Alarming quantity of confidential information, including SMS text messages, call records, device location, stored files and even user key pulsations. In addition, I could access details of the Wi-Fi network, obtain a list of installed applications and perform even more intrusive actions, such as recording audio, taking photos with the camera and capturing screenshots in the background. A threat that was quickly neutralized. Although the Kospy spyware managed to infiltrate the Play Store, Google acted quickly. A company spokesman confirmed to TechCrunch that all identified applications were eliminated. According to a lookout screenshot, the malicious app came to download a dozen times before being removed from the Android store. Integrated protection measures. Android devices have several layers of safety, including Google Play Protect, which analyzes applications before discharge, inspects the device in search of malicious software and, if it detects a threat, can automatically deactivate the harmful application. In addition, some manufacturers incorporate their own safety solutions, adding an extra layer of protection for users. Avoiding the hook. The best defense against malicious apps is caution. Before installing any application, you should check what permits request. If a simple flashlight app requests access to our files, contacts or accessibility settings, something does not block. Another effective strategy is to download applications from official sources. Instead of looking for “Microsoft Authenticator” in the Play Store and risk falling into a malicious imitation, it is safer get the link directly from the official Microsoft website. The same applies to any other service: if we need the BBVA app, Better go to your website and find the corresponding link therethus avoiding falling into traps. Images | Xataka with Dall ยท E 3 In Xataka | A group of North Korea hackers signed the greatest robbery of cryptocurrencies in history. Now we know how they did

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.