{"id":1305,"date":"2016-10-21T12:07:48","date_gmt":"2016-10-21T12:07:48","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=1305"},"modified":"2020-08-18T23:19:35","modified_gmt":"2020-08-18T17:49:35","slug":"hackers-are-now-hacker-spies","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/","title":{"rendered":"Hackers are now Hacker-Spies &#8211; How to stay protected"},"content":{"rendered":"<p>Hackers are not just hackers anymore, they have become hacker-spies. In the cyber criminal world hacking has advanced to spying and spear phishing is the potent weapon used in cybercrime.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3127\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/hacker-spies.jpg\" alt=\"virus protection\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/hacker-spies.jpg 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/hacker-spies-300x138.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/hacker-spies-225x104.jpg 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The skill and sophistication of hackers has increased over the years. Nowadays, malware, ransomware, botnets, and DDoS attacks are being offered as SaaS (Software as a Service). Hence, hackers need not be technical experts themselves or they themselves need not write the code required for hacking.<\/p>\n<p>Hackers are now employing the techniques used by spies and intelligence agencies to obtain or steal information. With the huge use of social media, even a moderately skilled hacker will be able to obtain a wide range of personal information about anybody quite active in the social lane \u2013 Facebook, Twitter, Quora, Instagram, etc,, Plenty of personal information as well as the characteristics of a person can be studied through their social media interactions.<\/p>\n<p>On social networks, plenty of personal information is shared \u2013 name, names of family members, pets, phone numbers, email addresses, photos, etc.., This is actually plenty of feed for a hacker-spy to plan out ways to conduct a cyber attack on that user.<\/p>\n<p>Armed with considerable information about the habits of the victims, hacker-spies plan and execute targeted spear phishing campaigns. These mails will appear legitimate, appearing to come from someone the user already knows. The latest mails are also well framed, and not like the mails which came earlier with typos, broken English, etc..,<\/p>\n<p>There have been instances of corporate finance officers receiving mails from their CEO or other superior officers asking them to transfer funds to a specific account. As this mail appears to come from the authorized person, the finance officer would hardly have any doubt and perform the transaction. An <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">antivirus solution<\/a> will not also detect the this as malware. Users in such statuses must be educated on being able to identify such bogus mails.<\/p>\n<p>While the above mentioned scenario is one type of instance, hacker-spies usually send mails with malicious attachments or links. Opening the attachment or clicking on the link would lead to installation of malware. Some sophisticated malware act quite subtly and are difficult to detect by traditional <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">antivirus<\/a> programs. The only way they can be detected is to have a robust Antivirus solution that has Real-Time <a href=\"https:\/\/antivirus.comodo.com\" target=\"_blank\" rel=\"noopener\">Antivirus scanning<\/a>, which would observe unnatural or unauthorized activity of the malware.<\/p>\n<p>There are a wide variety of cyberthreats, and in many cases education is what is needed to stay protected from cyber threats. There are many who argue that an antivirus is not effective against zero-day threats. But not all threats are zero-day malware. An effective and updated antivirus solution is definitely a necessity as it <a href=\"https:\/\/www.webinspector.com\/\" target=\"_blank\" rel=\"noopener\">removes malware<\/a> and keeps away hacker-spies.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers are not just hackers anymore, they have become hacker-spies. In the cyber criminal world hacking has advanced to spying and spear phishing is the potent weapon used in cybercrime. &nbsp; The skill and sophistication of hackers has increased over the years. Nowadays, malware, ransomware, botnets, and DDoS attacks are being offered as SaaS (Software [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1503,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[9],"class_list":["post-1305","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-antivirus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Spying is the new malware technique used by hackers<\/title>\n<meta name=\"description\" content=\"Know how to fight back and stay protected against cyber threats and spying that are evolved using a security solution such as antivirus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spying is the new malware technique used by hackers\" \/>\n<meta property=\"og:description\" content=\"Know how to fight back and stay protected against cyber threats and spying that are evolved using a security solution such as antivirus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-21T12:07:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-18T17:49:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/\",\"name\":\"Spying is the new malware technique used by hackers\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg\",\"datePublished\":\"2016-10-21T12:07:48+00:00\",\"dateModified\":\"2020-08-18T17:49:35+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Know how to fight back and stay protected against cyber threats and spying that are evolved using a security solution such as antivirus.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg\",\"width\":225,\"height\":170,\"caption\":\"Free Antivirus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers are now Hacker-Spies &#8211; How to stay protected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spying is the new malware technique used by hackers","description":"Know how to fight back and stay protected against cyber threats and spying that are evolved using a security solution such as antivirus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/","og_locale":"en_US","og_type":"article","og_title":"Spying is the new malware technique used by hackers","og_description":"Know how to fight back and stay protected against cyber threats and spying that are evolved using a security solution such as antivirus.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2016-10-21T12:07:48+00:00","article_modified_time":"2020-08-18T17:49:35+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/","name":"Spying is the new malware technique used by hackers","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg","datePublished":"2016-10-21T12:07:48+00:00","dateModified":"2020-08-18T17:49:35+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Know how to fight back and stay protected against cyber threats and spying that are evolved using a security solution such as antivirus.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2016\/10\/RF-10296_thb_15.jpg","width":225,"height":170,"caption":"Free Antivirus"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/hackers-are-now-hacker-spies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers are now Hacker-Spies &#8211; How to stay protected"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=1305"}],"version-history":[{"count":29,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1305\/revisions"}],"predecessor-version":[{"id":15038,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1305\/revisions\/15038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/1503"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=1305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=1305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=1305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}