The RedClouds Are Coming!

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

I TOLD YOU ALL TO READ THESE SCRIPTS AND ONW THE REDS ARE COMING! WHY DIDN’T YOU SUBSCRIBE LIKE YESTERDAY!?
Photo by Moose Photos, please support by following @pexel.com

Here we go again, with a well-known product and manufacturer comes the threat of great risk. This one is especially true if you part take in the use of Dells’ computers.

Information stealing malware isn’t anything new but with the current economy and threat actors wanting your information, the use of them has been on the rise.

We’re going to look at what kind of attack this is, who is using it, the functionality and effects upon release, and what are some ways you can at least try to keep your information safeguarded from this erection of threats.

Guys, we’re just serving up malware and trojans today. I hope you’re cool with that.
Photo by Clem Onojeghuo, please support by following @pexel.com

The Attack

The newest and hottest malware on the market looking to capture the heart of your data and forward it to the hands of someone else is called RDStealer. RDStealer does this by infecting the RDP server and watching the connections taking place.

For those unfamiliar with RDP, which is Remote Desktop Protocol, this is the network connection protocol that was offered by Microsoft, its purpose is to allow users to perform remote operations on other computers.

There has been some confusion about RDP vs VPN (Virtual Private Network) but in an effort to clear things up the difference is this, VPNs offer access to all resources on the network, these are items like file servers, printers, and company/organization websites meanwhile RDP offers only access to the resources on the given computer it’s connected to. In short, VPN access the network, and RDP access the computer.

There’s trouble on the horizon…or on the curve depending on how you view the Earth.
Photo by Pixabay, please support by following @pexel.com

Who Can It Be Now

At the moment of its “RedClouds” campaign, there is no one individual or group named for making use of RDStealer. However, while it’s campaigning its RedClouds, the malware will run a check to see if it detects a remote machine connected to a server and CDM (Client Drive Mapping). If “Enabled client drive mapping” is not enabled, then the client will deny the connection to the client’s file system. Meaning no check, no go.

RDStealer can collect keystrokes, and copy information from the clipboard data, and another dangerous thing to note is that it can target regardless of being client or server-side. When a network is infected, files in both “%WinDir%\System32%” and %PROGRAM-FILES% are filled in and could be filled with files and folders that could be excluded in a full-system scan.

This means these malicious files could hide under the radar during a scan. Afterward, there are a number of attack vectors, aside from the CDM, RDStealer can begin from web advertisements, email attachments, and social engineering methods. Moreover, like your hair, if you have any, don’t let your guard down as there will likely be more variety in the days to come. 

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Geez, I could never be a hacker. There’s so many things to choose from.
Photo by Craig Adderley, please support by following @pexel.com

The Sinking Feeling

Speaking on variety, it has been noted that threat actors use a custom version of this malware which utilizes the redirection feature which is done by watching the RDP connection and auto stealing from the local drives once a connection is made.

There are five modules that make up RDStealer which are a keylogger, persistence establisher, data theft, and exfiltration staging model, a clipboard content capturing tool, and one controlling encryption/decryption functions, logging, and file manipulation utilities.

Out of all this just know that it’s recording every move made and can possibly deny access to certain information via encryption. Once activated the malware enters an infinite loop calling the “diskMounted” function, this checks the availability of the drives on the tsclient network shares.

If the malware finds any connection, it then notifies the command-and-control (C2) server and begins pulling data from the connection with the RDP client. This is that “having a roommate who is a few months behind on rent move out and take a couple of your belongings before they go” kind of situation.

Just be aware, things may be a tad bit different the next time you turn your computer on.

If the Reds are coming, then it’s time for some Blue team action. All about the Blues baby.
Photo by Mati Mango, please support by following @pexel.com

The Prevention

It is safe to assume that if you have used a remote desktop via RDP that at some junction your system has been exposed to the RedClouds campaign.

It is hard to catch RDStealer manually, but you can better protect your system by using tighter security protocols and performing full-system scans often. While it has been noted this malware particularly goes after Dell computers given that it is coded to run in the Dell directories it is best practice to exercise caution while on the web. Using a 2MFA (Multi-factor Authentication) when abled as this will make it less appealing for threat actors because they have more to try to work around. And finally, encryption of your information is a must as this also helps ward off threats like RDStealer. Your information may be in the cloud but that doesn’t mean RedClouds should have unauthorized access to it.

Scriptingthewhy helps keep me in the know, that’s how I knew not to buy you online and from a reputable source.
Photo by Samson Katt, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on RDStealer? Script a comment below.

Experience the James Wood method

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Someone walking on a beach
What trying to find a job that needs my skillset in 2022 looks like.
Photo by Pixabay, please show support by following @pexels.com

Let’s say you’re on a beach, you’re taking a lovely stroll by yourself, watching the sun setting on the horizon as you walk by. The birds are flying high in the air, weaving up and down, some gliding to the ground and landing ahead of you.

You enjoy the smell of fresh ocean air with every step you take. As you’re walking taking in all that’s ahead, you notice some funny activity behind you like someone is following. You say to yourself, “Nah, this is a public beach, so it could be people just walking up to the water line.”

You turn around wide-eyed to find someone has been following you and not only has that person been pursuing you, but others have been trailing you as well. You see, while you’ve been taking this lovely soul-searching, deep thought-provoking stroll, those majestic footprints you have been leaving behind have turned into what are called “breadcrumbs” for anyone to track you.

If you didn’t know, the internet has always seen you with the ability to leave your mark in the digital sand. However, a perk to real sand is water washes your record in time. With digital, not so much.

creepy guy in mask wearing black robe in the woods
Thank you for shopping at Walmart, don’t forget to fill out our survey.
Photo by Rulo Mora, please show support by following @pexels.com

Digital Horror Ahead

What is this madness that lets people track you like you’re in a horror movie? They’re called digital footprints, or digital shadows as some would call them. Digital footprints are traceable activities, actions, or pretty much anything you do on the internet.

This could range from visiting websites (any sites, not just the ones with scantily clothed individuals you’re thinking about, ya freak…again, I am judging you) sending personal or professional emails, or even searching for your favorite Christmas dinner recipe that Nana posted so many years back.

And trust me, Gen-Z is finding out all about these footprints. There are several types of digital footprint which are passive, active, personally identifiable, anonymous, user input, and sensor data. In a nutshell, they range from “oh I didn’t know I was going to be redirected” to, “hey, my phone auto-suggested something I like”.

Having access to a lot of things is great but also being followed unknowingly and it being legal kinda sucks. I mean, where is the consent…I know I glossed over the privacy policy, but it was too long, and I wanted to see what the “baddies” on Instagram were all about.

man with cold stare
Helping shoppers around every corner.
Photo by Pixabay, please show support by following @pexels.com

Every Step You Take

So…this is about to get uncomfortable. Who tracks you like the sweet slow jam from the 80s? Well, one of them is ironically named the Police and just so happens to be one group that would turn to use digital footprints.

Police or law enforcement would use footprints to track cybercriminals and possibly keep track of online behavior. Do you remember that “Here, have a seat” guy? Digital footprints aid in situations like that. Do you like cookies? You do, that’s great!

Advertisers and people seeking your business like them too, cookies are used to customize ads for targeting you. Like, in my situation, you purchase one electric bike and now all you see in the ad space of every site you go to are electric bikes. It’s very haunting.

But while there are some creepy effects, digital footprint does have its benefits, ranging from detecting and preventing fraud, making shopping a breeze because, well everything is tailored to your interests, and even just the simple act of being able to recall a previously visited site.

Despite the fact you may click “no” in your preferences or settings when visiting a site, they still track you anyway. It’s like going to a store and one of the employees on the floor ask, “Do you need help finding anything?” and you reply with a “No, thank you, just browsing.” Followed by an awkward moment of silence and a brief stare.

You turn to walk, and they start following you anyway. Like good god, I just said no, go away.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

woman with gen z cake
Fun fact: if you bring a cake to your job interview…your chances of getting the job are still the same.
Photo by Polina Tankilevitch, please show support by following @pexels.com

Safe Space Results 404

Do you recall when I mentioned that Gen-Z is finding out about the horrors of digital footprints? No, then go back up and read this like a decent human being. If yes, then here goes the “oh no” moment, potential employers incorporate this in their decision to hire you.

This means every time you upload or like a twerk video, try to viral a cringe TikTok, post about how great America is compared to other countries on Facebook, or even tell your previous employer to go screw themselves on LinkedIn (sidenote; never air out your previous employer on social media), all of this runs the risk of you not landing that sought after position or promotion you’re seeking to claim.

However, there are ways to keep your footprint as small as possible, most of which are going to require you to do some work and by some, meaning a lot. This pretty much parallels fixing your credit score, your options are contacting data collectors, and telling them to forget your information (some of which may not play ball). Make your social media private.

If you wanted to take an easier route, you can sign up for third-party services that will handle things for you (keep in mind this is not a one-time buy, so as long as you’re on the internet and care about the effect of your online interactions, you’ll have to pay).

You can hide your browsing habits by using a good virtual private network or VPN, but like I always tell people, “Using a VPN is the same as using a condom, you can still get pregnant.”

You should panic a little bit if you worry about trying to land that dream job.
Photo by artawkrn, please show support by following @pexels.com

Digital History Unclear

Now you’re probably paranoid about your browser history and everything you’ve ever said on the internet. Should you be though? This is the year 2022 and we are in the age of “acceptance” and “fairness”.

Honestly, what you said years back when you were young should not come back to haunt you. Social media should be a place where you can connect with like-minded people and share ideas.

However, it seems like the internet is the best place for someone to pick up dirt and fling it at you. The internet has always been the wild wild west but for employers to add a digital footprint to your background check is madness because one or a few posts don’t display the whole picture.

Just hope one day people learn how to differentiate the before and after when making a judgment call. 

Me chances of getting a job is ruined, me should’ve stay off the hub blood. I’m ruined.
Photo by Tope A. Asokere, please show support by following @pexels.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Think someone has been watching your online habits?

Script a comment about how safe you think your digital footprint are.

Cracking Isn’t What You Think It Is

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

teenagers seated viewing their cellphones
Eric: Z-Daddy put up another script.
Sean: I know, I’m reading it… and stop calling him that. That’s weird bro.
Photo by Pixabay, please support by following @pexel.com

Here’s a question for you. Can you recall what you were doing back in your younger days? Like around the age of 15 or maybe even younger, 12. I would assume that for most people, you were either being grounded by your parents (or parent, I understand for some people a single-parent ran household may have been a reality) for something stupid you did or not being grounded and running around outside with your friends.

The point was, you were too busy either with your parents or with your friends to even have the thought of being seated in front of a computer. And in some cases, this shows signs that you grew up with a healthy childhood. But on the other hand, if you were, or tend to be anti-social, then forming together all the hallmark traits of becoming a hacker could have been something on the menu for you. You don’t know what a hacker is? Let me script it for you.

young man pulling up hoodie
It’s hacking time.
Photo by Mati Mango, please support by following @pexel.com

Hacking Many Hats

Before we start this, I want to be clear, hackers do not sit in front of a computer in the dark typing really fast with a hoodie on trying to crack code…the brightness from the screen tends to hurt our eyes after a while. There are a lot of meanings for the term “hacker”, but the actual definition doesn’t match the sexiness of Hollywood’s definition.

A hacker is someone who uses their skills to gain access to systems and networks without authorization. And before you ask, no, there isn’t an age limit to becoming a hacker. Hackers often fall into one or two of the three categories, you have “Black Hat” – the cybercriminal who is looking to illegally access a system with malicious intent, “White Hat” – the “good guy” who identifies weaknesses in an architecture of an organization which they then inform and advise, and last is “Gray Hat” – which is the combination of both white hat and black hat. Needlessly to say, they operate to what suits their best interest at the given time.

There are other types of a hacker, “Green Hat” – newborn hackers, “Blue Hat” – are white hats who are employed to improve security systems and conduct pen-testing, and the last is “Red Hat” – which are vigilante hackers, these are the individuals that hack in the name of justice.

old man holding up a fan of cash
Businessman…the old school hackers before the internet.
Photo by Andrea Piacquadio, please support by following @pexel.com

Big Wins with You Losses

Hackers tend to go after big-name financial institutions because of the chance to win big and get a nice payday. However, the risk of doing so results in possibly being caught, fined, and put in prison. So what is a better alternative to avoid that? That’s right, you guessed it, they target the little guy, putting your sweet cornhole on the menu.

While your money may be the most important thing to you, your information like social security, address, and entire name, pretty much everything that says who you are online and in life is way more valuable to a hacker.

The collecting of your personal information is called “information aggregation” and once complete or they feel enough is acquired could result in you getting charged for things you didn’t sign up for, like a loan, a timeshare, or getting a speeding ticket in the mail for a car you don’t own. Basically, your data goes up for sale on the dark web to the highest bidder. And here you were thinking no one had an interest in you, well not you per se since it’s the data they want but still don’t discredit yourself. You go you.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

teen looking up at the sky.
The sky is the limit on how many accounts I can hack.
Photo by Myicahel Tamburini, please support by following @pexel.com

Hacking When We were Young

Remember when I mentioned that anyone could be a hacker? I was kidding but then again, I wasn’t. You see hackers can come in many shapes, sizes, and flavors. Flavors are the level of skills that they possess to get the job done. Most hackers are often referred to as “Script Kiddies” (No, there’s no relation to them and this site, you’re safe), they’re low-level and mainly purchase malicious code also known as scripts to use to perform malicious attacks.

But then you have your hackers who really know what they’re doing. Such as the likes of Kevin Mitnick- the world’s most famous computer hacker. He hacked into North American Defense Command, Digital Equipment Corporation’s network system. He was arrested and later upon release, decided to hack Pacific Bell’s voicemail system as a flex to show that he could.

Albert Gonzalez started around the age of 12 and was later arrested for debit card fraud in relation to stealing card information. He stole more than 180 million payment card accounts across different companies. And Jonathan James or maybe formally known by his fictitious name “C0mrade”, was deemed one of the best hackers in history.

This was attributed to him gaining access to private network systems with the flex being “this was done just for the fun of it”. Again, recall what you were doing back when you were 15, at the age of 15, he hacked into NASA (National Aeronautics and Space Administration), the Department of Defense (DoD), and South Bell to steal software.

This is insane because his hacking into NASA led to them being shut down for 21 days and cost about $41,000. Getting things fixed was cheaper back in the day, am I right?

young man with a look of worry
I just had to click on a file saying, “Baddies: one-click nude-pic”.
Photo by Mati Mango, please support by following @pexel.com

So, you’re probably worried about trying to protect yourself from getting hacked and having all your juicy information all over the internet. Well, I have good news, it’s too late. Well, not entirely, maintaining best practice use of devices and being mindful of your interactions on the internet could save you a lot of financial pain in the long run.

Never leave your device alone in an area whether you trust your surroundings or not, practice using complex passwords – involving letters, numbers, and characters, which makes it harder and takes more time to crack. Do not use any part of your name or the name of anyone you may know for Bluetooth and or Wi-Fi devices as this could give hackers possible information to utilize and further their pursuit.

Always use multi-factor (MFA) or two-factor authentication (2FA) when dealing with online accounts and any other login site as this helps with ensuring that it is you accessing them. Always make use of anti-virus/anti-malware as this will hinder hackers’ attempts to install unwanted programs/files onto your machine. And always make sure your operating system, the OS, is up to date.

Most of how to protect yourself is using common sense, like you wouldn’t just leave your front door unlocked while you’re away on vacation or just have some random person walk in your house to Netflix and chill, don’t leave your device unattended, and don’t let people you don’t know on your device or network. I mean I know hackers can get clever and lucky but most of the time it’s made easy for them.   

gentleman in suit face palming his head.
I have a degree in computer science but what I really needed was common sense.
Photo by Andrea Piacquadio, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you have a feeling that may have missed something about hackers? Script a comment below.