Cyber Security

Zacinlo: The Cyber Menace Slipping Through Windows

If social media has taught us anything, it’s that the best pictures are candid (or at least, give the impression of being candid; see “plandid”). While candid beauty shots are great for Instagram, candid screenshots of your desktop taken by hackers are definitely no fun. Unfortunately, this could have been happening to you for years—without your knowledge or consent.

This is the frightening reality of Windows users who have fallen victim to Zacinlo, a malware so sophisticated it has evaded cyber security experts since 2012. Here’s what we know so far about this sneaky cyber threat—and how you can protect yourself against similar attacks in future.

Cracking Windows and slipping in undetected

Upon its 2015 debut, Microsoft’s Windows 10 operating system (OS) was widely considered to be the benchmark for cyber security—boasting features that, as one journalist put it, “protect the core kernel from malware and prevent attackers from remotely taking control of the machine.” Throughout the years, Windows 10 has maintained its status as the gold standard of cyber security, but even it proves no match for Zacinlo.

Launched in 2012, the Zacinlo malware was only discovered by Romanian researchers in 2017—and its existence was first made public in June of this year. In an era in which frequent, high-profile security breaches have cyber security specialists on high alert, it’s rare for a cyber threat to go unnoticed for so long—but Zacinlo is a rare breed of malware.

The rootkit malware installs itself on the lowest levels of Windows, where detection is most unlikely. Even if it is detected, Zacinlo disables antivirus and anti-malware programs and writes itself into the Windows registry, rendering attempts to remove it by rebooting or even reinstalling Windows ineffective.

Lurking out of sight, spying from within

Once installed, Zacinlo uploads system data to its command and control server, which removes AV packages, programs that compete with its core adware mission, and any other software that might interfere with its operation. Zacinlo begins serving pop-up ads to the victim’s desktop. In the background, meanwhile, it runs a browser with no user interface. This two-part method tricks the end user into clicking on links that they can’t see, giving Zacinlo the green light to commit ad fraud and install other malware onto their device. All the while, the malware covertly snaps screen captures of user activity and sends it to its server.

As if this weren’t enough, Zacinlo has the ability to set up a man-in-the-middle operation on the victim’s computer, allowing it to siphon off data like logins, passwords, and banking information. It also redirects browser requests and brings the user to fake web pages.

The vast majority of Zacinlo victims (90%) are running Microsoft Windows 10, although a small percentage use Windows 7 or 8. While most are located in the U.S., victims have been identified in other regions of the world, including Western Europe, China, and India.

Protecting yourself from Zacinlo and other threats

What can you do when a cyber menace is cracking Windows and slipping in undetected? Start by strengthening your system’s firewall. A properly configured firewall blocks threats like Zacinlo from entry. And if the malware is already on your device, you can count on your firewall to prevent it from communicating with its command and control server.

If you don’t have a firewall system in place, believe it may be time for an upgrade, or want to ensure that your existing firewall is functioning at full capacity, eMazzanti can help. Our expert team of cyber security and firewall specialists are on hand to keep your OS secure and your most sensitive data safe from prying eyes. To find out more, get in touch today.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Top 5 Collaborative Tools in Microsoft 365 Drive Productivity and Innovation

In today’s fast-paced digital landscape, businesses cannot thrive without effective collaboration. Microsoft continues its unwavering…

2 days ago

7 Essential Contact Information Tips for Email Signatures to Enhance Your Professional Image

An email signature accomplishes much more than simply telling readers who you are and how…

1 week ago

Maximizing Threat Response Efficiency with Security Copilot

Cyber security professionals work hard to safeguard companies’ information. But with criminals constantly changing their…

2 weeks ago

Why should a firm use DMARC? What is the need?

Domain-Based Message Authentication, Reporting, and Conformance (DMARC) is an e-mail security protocol designed to validate…

3 weeks ago

eCare Cloud Backup is in fashion. It’s the new you!

My job is to manage my law office’s cloud servers here at Justice Freaks.  As…

4 weeks ago

I Think I’m Dating an AI

My worst nightmare would be to date someone who isn’t who they say they are.…

4 weeks ago