Problems Rooted in Five

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

man leaning on hand and looking away.
It was only five minutes; I shouldn’t feel this guilty.
Photo by Keira Burton, please support by following @pexel.com

So you’re at your computer sitting on your fart box, surfing the vast world of the internet and you decide to make a pit stop in the “red light district” because you have five minutes of free time and no one is around so you don’t have to feel an ounce of shame.

Given that you have five minutes means you’re on the clock and you figure downloading would be faster than streaming. After you find and download that sweet but extra spicy file to handle your developing situation, once the fun is had and the mission is complete, a moment of clarity happens.

You notice something, it’s a strange shortcut on your desktop named “This is nothing to worry about”. Thinking to yourself, “Hmm, that wasn’t there before. Oh well, I’m sure it’s nothing to worry about.” But wait sweet child of mine, it is something to worry about indeed.

Like a chick who partied too hard and left a frat party the next morning, how would you feel if I told you; You just may be pregnant? Don’t understand? Let me explain.

a woman with headache checking her phone.
Don’t tell me I just missed another script from Z-Daddy.
Photo by Polina Tankilevitch, please support by following @pexel.com

Rooting to the Core

You see, while you were in the red-light district of the internet seeking your jollies. Someone has provided something called a “rootkit” to get into your computer and well, have its way with your machine.

A rootkit is a type of malware that can provide administrative privileges to hackers for complete control of a targeted device. There are five types of rootkits and none of which are pleasant to deal with.

Hardware (Firmware) rootkit infects your computer’s hard drive, the BIOS (Basic input/output system), and your router.

Bootloader rootkit, your bootloader is an important tool since its loads when your computer is turning on, however, when booting, the system can be attacked and even replace your computer’s bootloader with a tainted one.

Memory rootkit hides in the computer’s RAM (Random Access Memory) and like football players running plays in the backfield, carry on any number of malicious tasks in the background. A good thing to note is they only live while your computer is on and sometimes go away after a simple rebooting, however, in some cases, you may have to do more.

An application rootkit will replace a file in your computer with a malicious file or files. This could also alter the way an application works such as Word or Notepad. A problem with this is trying to figure out which program is infected because an infected program will operate normally.

Lastly, kernel mode, the worst one in my opinion, hits the core of your computer’s operating system and can change how the OS functions. Where in some cases if not most, turns your computer into a zombie.

man standing with laptop saying "you've been hacked!"
Your computer will passively tell you this.
Photo by Saksham Choundary, please support by following @pexel.com

Crackers Seeking Control

Who are the people who use such a thing? Hackers originally were called “crackers” because they were working to crack a code or into a network and not hack but hackers just stuck I guess. These cybercriminals use such tactics to make like your nosey neighbor and eavesdrop on your interactions.

Hackers can intercept personal information via keyloggers which are devices that collect your keystrokes while typing on a keyboard. Yes, to all of you keyboard peckers, if were to equate your typing to internet speed, hackers would consider you to be dial-up. But while logging keystrokes, hackers, as mentioned before, can gain control of your operating system.

While eavesdropping, hackers can also conceal their digital footprint on a compromised system leaving a backdoor for frequent visits without being detected. So this is in a sense, your nosey neighbor jimmying your door and being allowed to free roam while you’re sat on the couch watching tv.

gang of friends with tattoos on street sunbeams.
Star Wars or Star Trek, choose your answer wisely.
Photo by Khoa Vo, please support by following @pexel.com

Nerds and Drive-by Exploits

Why is knowing about rootkits so important? Well, if you had experience with dealing with a stalker, you know things can get uncomfortable, however, if you find that not only, they are stalking you but are also inside the house. Things can ramp up very quickly.

Rootkits have the same behavior, a rootkit’s goal is to get into your system, bury itself deep within your OS, and change, collect, release, or even perform a combination of all three in your machine. But like stalkers, rootkits don’t just limit themselves to your house, smartphones, and other devices are not off the menu as they have several exploits such as GPS, battery, and voice.

There are ways to check for a rootkit, one way is looking for any strange behavior such as your machine is operating on its own. Another is performing a memory dump analysis which is to take all the information from the RAM and put it onto a storage drive for later analysis. Performing a factory reset will typically remove some infections but like cockroaches, some will survive.

The use of anti-virus programs like Norton or McAfee will not get rid of a rootkit, especially if they’re not up to date. As with any other type of malware, the absolute best way to avoid a rootkit infection is to never get it in the first place.

This might be easier said than done since visiting some sites will trigger an event where a file will be downloaded onto your computer without any action on your end. This is called “drive-by downloading”. I thought drive-bys were just limited to being in “da hood”, apparently, they can happen in IT too.

The thought of gang-affiliated nerds beefing with each other and doing drive-bys just broke me, I’m sorry. This event is hard to keep up with as it’s not just limited to any unknown sites, well-known and legitimate sites could have embedded code in them.

But if you have to visit some unknown sites because your curiosity about the darknet is killing you then keeping your operating system and all your software up to date will aid in the protection of your machine from rootkits.

man in hat looking with evil intent.
Z-Daddy wants to know why you haven’t joined ZeroClay Nation yet. Subscribe today and no one gets hurt.
Photo by Fariborz MP, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Feel like I may have missed something? Script a comment below.

AI in the Job Market and You

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Alexa, I said I wanted “spam”, that didn’t mean mail me spam.
Photo by Andrea Piacquadio, please support by following @pexel.com

AI Talk

What’s the big deal!?

As the world turns, we’re finding more and more technology coming out, malware being spread, and phishing attempts ending up being successful. Not sure how phishing attacks are still getting people in trouble, but hey, when you’re lonely and want money, a prince is a prince. In the grand scheme, we should be proud of our wonderful accomplishments. However, we simply can’t have nice things. I mean, we have life, and we’re making that difficult. A quick shoutout to our four fathers for paving the way to this point. Point out life’s struggles aside, what is the latest in this crazy world? If you have been living under a rock, then let us introduce you to the world learning to live with “AI” (Artificial Intelligence).

Gasp, yes, the computers are getting smart, but they’re not getting smarter than us…yet. We’re going to be looking at what is AI, a little of how it came about, and what are some things you may need to know to keep your job. Because yes, AI will take your job. AI, what is it? It’s the uprising of the machines and taking the world for themselves. You’ve been informed, thank you for reading, and have a good day.

No, AI in its simplest terms, is giving machines the ability to learn like humans do from experiences. This could range from playing critical thinking games like chess and checkers, to self-driving cars. And before you think to say anything, don’t doubt checkers, there have been some tense moments. Now given our machines can learn (somewhat) like we do, to the machine this all breaks down to just ones and zeros.  

The ones and zeros, which are called “binary”, are encapsulated in what’s called “machine language”. We’re not going to cover it now, just know, if you want to learn this programming language.  You’re going to be heading down a rabbit hole because you’ll be learning how the computer puts together outputs for humans to understand.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

I work with computers, my job is safe from AI, right?
Photo by Brett Sayles, please support by following @pexel.com

The early days of AI, which has nothing to do with what we have today, began with a mixture of mathematics, philosophy, and technology from the Greeks. That was then later pioneered by Alan Turing, an English mathematician and logician. He proposed the idea that machines could simulate human intelligence. Then at the Dartmouth Conference in 1956 is often cited as the birth of AI as a field of study, where the term “artificial intelligence” was first coined, and the potential of intelligent machines began to capture the imagination of researchers.

This discipline formed the making of simple algorithms for the development of complex neural networks. An example of this is each neuron in your brain has a set of instructions or a program, which when it has information, that information is sent down the line to the next neuron for processing. Bringing this to a larger scale, a neural network working in tandem to provide decision-making. Choosing to learn builds your neural network, choosing not to build…well, nothing.

Okay, so at this junction, you’re probably wondering “How is AI going to replace me at work?” To answer your question, it’s a grey area. AI will replace jobs like customer service, basic software engineering, and other basic one-dimensional occupations.

We’ve seen how cashiers in a way getting phased out with self-checkout kiosks popping up in stores. Call centers and websites have moved to using AI instead of people. Developers have turned to the aid of AI to develop code. AI at this point in time will not replace jobs like carpentry, doctors, or construction.

However, just because it’s not happening right now, doesn’t mean it’s not going to happen within the next five years. The best way to ensure that you have a job is to make sure AI doesn’t outlearn you. This means go out and start learning today more than you did yesterday.

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on AI? Script a comment below.

Google Ribbed Play Store

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Tucker: What’s with this scriptingthewhy nonsense? You actually like this stuff?
Becky: Granddad, just read it. You might learn something.
Photo by cottonbro studio, please support by following @pexel.com

Picture this if you will, you’re on the Google Play Store. You’re clicking around, hopping in and out of application descriptions, and viewing all the potential great ideas that developers have worked tirelessly to create and you’re just having a beaming time.

While rifling through several apps, you find one particular to you and figure to download it. While watching the app’s progression in downloading you begin to get an eerie feeling like something may be off.

Let me script for you how things may get interesting in the days to come. Trust me, you’re not going to love it.

Oh come on Zeroclay, what about my phone isn’t safe now!?
Photo by Olha Ruskykh, please support by following @pexel.com

Few Malware Apps a Ton

If you have an Android product, then there is a high chance that you have spent some time on the Google Play Store viewing tons upon tons of applications just waiting to be installed on your phone.

Now while it is common knowledge that the Play Store is a trusted source, that does not necessarily mean that everything on the Play Store is a trusted product. As of recent there has been a surface of a malware called “Fleckpe”.

Fleckpe is an Android Trojan that first appeared at the start of 2022 and not only has it amassed more than 620,000 downloads, but it has been receiving upgrades as well.

But I can hear a few of you reading this saying “Z-Daddy, I’m not clear on what a trojan is.” And to those few, don’t worry, I got you. A trojan is malware that is disguised as a legitimate program and when installed, is released, and can wreak havoc on your machine. Clearly, this trojan isn’t ribbed for your pleasure.

Also, one of the upgrades has a nasty secret feature you’re not going to be happy about knowing. Needless to say, this trojan is packing and again, it’s not for your pleasure.

Evan: he said it had affected here, here, and here.
Ms. Simon: You’ve been reading scripts again instead of doing your homework, haven’t you?
Photo by Tima Miroshnichenko, please support by following @pexel.com

Packing the Details

So, what are some of the areas that are feeling this trojan’s imprint? Well, since this is on the Google Play Store and the Play Store has users in a lot of countries leading this to be pretty much set on a global scale, you can count on this imprint to be globally distributed.

Although, areas that have been confirmed to be affected are Thailand, Indonesia, Singapore, Malaysia, and Poland. As a side note, it has been noted that authors of novel viruses, malware, and trojans alike have said that they are pleased when their creations go places where they can’t.

One author had said that even though the US had kept him away, the fact they couldn’t do the same with his creation was a satisfying feeling.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

What’s this nudemidgetcowgirlsfromouterspace subscription and why is it $29.89 a month? I never signed up for this!
Photo by MART PRODUCTION, please support by following @pexel.com

Unwanted Subscriptions and Spin

Are you wondering how this trojan worked? Once you had downloaded and installed one of the eleven infected applications from the Play Store, which were used either for photo editing, wallpapers for the background of your device, or an application that involved the camera, the good times would roll downhill…along with your credit score.

The infected app would request access to notification content that is required to capture subscription confirmation codes for an array of premium services. Fleckpe then springs into action, decoding its payload containing infected code. The payload contacts the command-and-control (C2) server that relays information back to the attacker about the newly infected device.

This includes the Mobile Country Code (MCC) and Mobile Network Code (MNC). Following this would be a paid subscription page that is opened on an invisible web browser window and attempts to subscribe on the victims’ behalf by abusing the granted permissions and obtaining the confirmation code required to complete this step.

Yes, this is exactly what you’re thinking. It’s like having your spouse sign you up for a spin class without your knowledge and opting for the highest difficulty so they can get a laugh.

Ugh, unwanted bills, spin class, and subscriptions. How do we stop this one now Z-Daddy?
Photo by Tima Miroshnickenko, please support by following @pexel.com

Watching Bill and Company

Are you ready to take some steps to ensure this doesn’t happen to you? There are a few steps you can take to ensure that you don’t get imprinted with this trojan on your device.

One way is just to be cautious of downloading apps from both trusted and unknown sources. Being vigilant when dealing with requested permissions during the installation process and keeping a watchful eye on your billing statements to catch any unauthorized activity such as subscriptions and charges.

Below are the comprised apps:

  • Beauty Camera Plus (com.beauty.camera.plus.photoeditor)
  • Beauty Photo Camera (com.apps.camera.photos)
  • Beauty Slimming Photo Editor (com.beauty.slimming.pro)
  • Fingertip Graffiti (com.draw.graffiti)
  • GIF Camera Editor (com.gif.camera.editor)
  • HD 4K Wallpaper (com.hd.h4ks.wallpaper)
  • Impressionism Pro Camera (com.impressionism.prozs.app)
  • Microclip Video Editor (com.microclip.vodeoeditor)
  • Night Mode Camera Pro (com.urox.opixe.nightcamreapro)
  • Photo Camera Editor (com.toolbox.photoeditor)
  • Photo Effect Editor (com.picture.pictureframe)

Make sure you check the reviews to see if anyone has had or is having issues with the application. If you find that you have downloaded one of the following applications that were compromised, uninstall them immediately and keep a watchful eye on your phone bill.

The main thing you can do is remain vigilant as scammer scamming is increasing on the marketplaces such as Google Play. All-in-all, it’s best practice to just keep a watchful eye on your bill seeing as though there is no real sure-fire way to protect from the bad guys getting in. Security is always secure enough, it’s never 100%.

Tom: I’m great goalie…but even I can only stop so much.
Photo by Tony Schnagl, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on Fleckpe? Script a comment below.