{"id":698,"date":"2020-04-16T20:07:12","date_gmt":"2020-04-16T20:07:12","guid":{"rendered":"https:\/\/osintme.com\/?p=698"},"modified":"2020-04-16T21:18:35","modified_gmt":"2020-04-16T21:18:35","slug":"osint-me-tricky-thursday-5","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2020\/04\/16\/osint-me-tricky-thursday-5\/","title":{"rendered":"Osint Me Tricky Thursday #5 &#8211; Malware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"698\" class=\"elementor elementor-698\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-851dabd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"851dabd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c26068c\" data-id=\"c26068c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1b2428b elementor-widget elementor-widget-text-editor\" data-id=\"1b2428b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The infrequent, irregular Tricky Thursday is back, this time to focus on digital security.<\/p><p>What are the signs of malware infection on your computer?<\/p><p>Let&#8217;s take a look at some indicators.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e8a32a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8a32a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d376d84\" data-id=\"d376d84\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2fd6ae2 elementor-widget elementor-widget-text-editor\" data-id=\"2fd6ae2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">1. The computer is running slow and with overall decreased performance. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Malicious software can affect everything, from browsing the Internet to using local applications on an endpoint. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">If it\u2019s a Windows machine, the Windows Manager might display unknown or unfamiliar tasks running in the background. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">HDD available space can be running low, as well as it might become fragmented.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e21b3c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e21b3c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b549cd0\" data-id=\"b549cd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81f6745 elementor-widget elementor-widget-text-editor\" data-id=\"81f6745\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">2. Suspicious registry changes are noticeable or other changes to the system file. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Malware typically makes changes to the registry, especially if it installs: <\/span><\/p><ul><li class=\"western\"><span style=\"font-size: medium;\">packet sniffing software<\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">a keylogger<\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">a credential harvester<\/span><\/li><\/ul><p>\u00a0<\/p><p align=\"justify\"><img decoding=\"async\" data-recalc-dims=\"1\" src=\"https:\/\/i0.wp.com\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2014\/07\/POWERLIKS2.jpg?w=1200&#038;ssl=1\" alt=\"POWELIKS: Malware Hides In Windows Registry - TrendLabs Security ...\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d596c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d596c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-05b405d\" data-id=\"05b405d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e525f8 elementor-widget elementor-widget-text-editor\" data-id=\"9e525f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">3. Pop up ads appear unexpectedly while browsing. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">This points towards possible adware or spyware infections. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Especially Java-based pop ups can be disguised to imitate legitimate programs that the user is expected to have on their machine.<\/span><\/p><p align=\"justify\">\u00a0<\/p><p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">4. Increased and unusual Internet traffic. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Malware often creates unusual outbound network traffic from the infected endpoint, for example due to connecting to the C2 servers. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">This results in DNS anomalies, typically spikes in DNS requests to external resources outside the company network.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f9e986 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f9e986\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d3a4320\" data-id=\"d3a4320\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8197689 elementor-widget elementor-widget-image\" data-id=\"8197689\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"724\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/asware-pop-up.jpg?fit=1024%2C724&amp;ssl=1\" class=\"attachment-large size-large wp-image-700\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/asware-pop-up.jpg?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/asware-pop-up.jpg?resize=300%2C212&amp;ssl=1 300w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/asware-pop-up.jpg?resize=768%2C543&amp;ssl=1 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Example of a malicious pop up window<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-09f173d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"09f173d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b4060f8\" data-id=\"b4060f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9d92ce elementor-widget elementor-widget-text-editor\" data-id=\"c9d92ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">5. Disabled security updates or unexpected patches. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Attackers often switch off security updates on the target machine as the installation of these updates could disrupt their connection to the malware and their ability to operate it. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Likewise, the presence of unexpected updates or patches can be alarming and might suggest that the attackers are manipulating the target system to adjust their vector of attack.<\/span><\/p><p align=\"justify\">\u00a0<\/p><p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">6. Any non-user made changes to the system. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">This may include cosmetic visual changes, but also things like: <\/span><\/p><ul><li class=\"western\"><span style=\"font-size: medium;\">extra toolbars in the browser, <\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">new shortcuts on the desktop<\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">new programs listed, <\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">device profile or user changes, <\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">lost access to a HDD partition or the whole drive, <\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">unexpected running \/ shutdown of various programs, including the cmd prompt or Powershell, <\/span><\/li><li class=\"western\"><span style=\"font-size: medium;\">unexpected messages suggesting the antivirus or firewall has been disabled.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-df9a1dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"df9a1dc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e869b8b\" data-id=\"e869b8b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7335c68 elementor-widget elementor-widget-image\" data-id=\"7335c68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"643\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/firewall-disabled.jpg?fit=1024%2C643&amp;ssl=1\" class=\"attachment-large size-large wp-image-701\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/firewall-disabled.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/firewall-disabled.jpg?resize=300%2C189&amp;ssl=1 300w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/firewall-disabled.jpg?resize=1024%2C643&amp;ssl=1 1024w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/firewall-disabled.jpg?resize=768%2C483&amp;ssl=1 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e8e7046 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e8e7046\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-19ad0c7\" data-id=\"19ad0c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-563fbf4 elementor-widget elementor-widget-text-editor\" data-id=\"563fbf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">7. Other users\/contacts complaining of spam sent to them via social media or email. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">This might indicate a spyware infection and the fact that login credentials for a particular online resource have been compromised and a third party has access to them.<\/span><\/p><p align=\"justify\">\u00a0<\/p><p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">8. Signs of Distributed Denial of Service (DDoS) attack. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">This applies not so much to individual endpoints, but to the networked system overall. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Typical signs of a DDoS include throttled network performance, inability to log into online resources, websites and servers being down. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Although a DDoS does not automatically mean a malware infection, it can be indicative of a sustained directed attack on a system in which malware can be another vector of attack.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8323201 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8323201\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5faa973\" data-id=\"5faa973\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b671e2d elementor-widget elementor-widget-image\" data-id=\"b671e2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"651\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/DDoS_attack.png?fit=1024%2C651&amp;ssl=1\" class=\"attachment-large size-large wp-image-702\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/DDoS_attack.png?w=2064&amp;ssl=1 2064w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/DDoS_attack.png?resize=300%2C191&amp;ssl=1 300w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/DDoS_attack.png?resize=1024%2C651&amp;ssl=1 1024w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/DDoS_attack.png?resize=768%2C488&amp;ssl=1 768w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/DDoS_attack.png?resize=1536%2C976&amp;ssl=1 1536w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/04\/DDoS_attack.png?resize=2048%2C1302&amp;ssl=1 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">DDoS attack (source: F5.com)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-54e7ce0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"54e7ce0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-491ba04\" data-id=\"491ba04\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42f610b elementor-widget elementor-widget-text-editor\" data-id=\"42f610b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">9. Hardware problems. <\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Typically encountered in file-less malware attacks; one example being hijacking hardware resources of a machine to mine cryptocurrency. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">File-less malware is designed to evade file and signature-based security controls, like the traditional antivirus programs. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Its presence can be encountered easier on the endpoint and it manifests itself by CPU and GPU suddenly working with a significantly higher intensity, to the point of overheating or indeed getting damaged by overuse.<\/span><\/p><p class=\"western\" align=\"justify\"><strong><span style=\"font-size: medium;\">10. Strange user login patterns.<\/span><\/strong><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"> Once again, this is encountered in corporate environments with a larger number of users. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Sudden changes to established login patterns, like for instance users accessing company resources outside normal working hours or from IP addresses geographically not matching the company\u2019s area of operations. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">A very blatant sign of this is an instance of account login within a short period of time from various IP addresses around the world. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">It suggests the account credentials have been compromised.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What are the signs of malware infection on your computer? Some indicators to consider explained here.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[60,61,15,26],"class_list":["post-698","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-hacking","tag-malware","tag-security","tag-tricky-thursday"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=698"}],"version-history":[{"count":6,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/698\/revisions"}],"predecessor-version":[{"id":711,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/698\/revisions\/711"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}