In such way, they infect big number of users systematically, Komrarov added.

The more times the malware is installed unknowingly by a user, the more money the cybercriminal is due.

Some of the identified elements of their infrastructure were hosted in the TOR web link, InfoArmor explains.

How most popular torrents are used to spread malicious malware

Article image

spot_img

source: www.techworm.net