Kirill Kruglov, senior researcher and developer at Kaspersky Lab, told socialbites.ca that due to the large number of malware source code leaks, hackers have switched from selling a specific product to selling access to infrastructure where software can be produced independently.
“These are design programs with different settings, where you just have to tick the boxes. After reading the instructions, you can choose the parameters you need, specify where to send the data, where your command server will be, click the “create” button and thus get your own unique software,” said Kruglov.
Thus, the buyer can create his own software from the “malicious Lego”.
“Malicious programs created in such installers are the most common type of computer threats in the modern world. It also applies to industrial systems,” Kruglov noted.
Read more about how much it costs to break into large companies’ systems, why three training classes are enough for hacking, and what a malware designer is – here report Kruglova “socialbites.ca”.
Formerly cyber expert at Kaspersky Lab saidHow does hacker tech support work?