Hackers exploiting trust with malware triumvirate
Hackers are using three families of malware in exploiting user trust in supposedly safe websites.


Some savvy cyber criminals have used just three families of malware to infect around five million systems, in what one security firm has labelled the "trust phenomenon."
Rather than using more shady areas of the internet, such as pornography or download sites, to spread infection, the hackers tracked by avast! have sought to exploit user trust in websites believed to be secure.
Users appear to have plenty of faith in well-known web services, with one user complaining to avast!: "I very much doubt Google is sending me a Trojan."
Another said they didn't want their time wasted by alerts from avast!.
"The danger is in the familiar, everyday trusted places on the internet which are as much a part of a daily routine like your morning coffee," said Jiri Sejtko, avast! senior virus analyst.
"People send us complaints about false positive detections' and even disable their AV protection in order to reach their desired location then they wish they hadn't."
The three kinds of malware that avast! believes to be part of the "trust phenomenon" include the Ill family, Kroxxu and JS:Prontexi.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
All are technologically very different, according to avast!, but they are also highly effective in snaring unwitting users.
"Bad guys move in cycles, creating new variants with the knowledge gained from previous generations," Sejtko added.
"When you get an alert from your antivirus program, don't ignore it."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting
News Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year.
By Emma Woollacott
-
Horabot campaign targeted businesses for more than two years before finally being discovered
News The newly-discovered Horabot botnet has attacked companies in the accounting, investment, and construction sectors in particular
By Ross Kelly
-
Brand-new Emotet campaign socially engineers its way from detection
News This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
By Ross Kelly
-
Microsoft says “it’s just too difficult” to effectively disrupt ransomware
News The company details its new approach to combatting cyber crime as the underground industry drains $6 trillion from the global economy
By Connor Jones
-
Beating the bad bots: Six ways to identify and block spam traffic
In-depth Not all traffic is good. Learn how to prevent bad bots from overrunning your website
By Sead Fadilpašić
-
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia
News The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
By Connor Jones
-
Microsoft's secure VBA macro rules already being bypassed by hackers
News Recent analysis of Emotet activity has revealed a shift away from malicious Office documents to drop malware
By Connor Jones
-
Emotet infrastructure has almost doubled since resurgence was confirmed
News Researchers confirm the infrastructure has also been upgraded for a "better secured", more resilient operation
By Connor Jones