Advertisement

News

If you struggled with trigonometry, this malware can be your worst nightmare

Between sine and cosine, they slipped in the tangent.

If you struggled with trigonometry, this malware can be your worst nightmare
Daniel García

Daniel García

  • Updated:

Trigonometry was one of the few words that could terrify a high school student, and now it can also be terrifying for those who might suffer a malware attack on their computer. A new malware is capable of bypassing security alarms by using trigonometric calculations in its commands, allowing it to mimic a human who naturally handles the device.

This malware, capable of stealing all kinds of personal information, including banking data or cryptocurrency wallets, used this ingenious method to evade security barriers and freely operate within the attacked PC. Detecting it hasn’t been easy, but it’s now listed as a dangerous malware to avoid.

Avast Free Antivirus DOWNLOAD

A malware that sets the standard

This malware would be LummaC2, and by bypassing computer security mechanisms, it’s capable of stealing information such as tracking cookies, passwords, banking data, cryptocurrencies, and any compromising content available within your device. It’s a tool used by many cybercriminals and is challenging to detect due to the trigonometric calculations it employs to simulate human-like mouse behavior.

The earliest records of this malware date back to December 2022, suggesting that this tool had been conducting cyber attacks for a maximum of one year. This also showcases the constant adaptation of malware to different security measures to evade them and continue carrying out illicit actions.

It’s important to have healthy habits in cybersecurity

The importance of cybersecurity

“Cybersecurity has always been one of the most crucial aspects of computer development. However, in today’s times, where digital commerce is exponentially advancing year after year, it has become an indispensable point where profound advancements have been made, especially considering the network security compared to what existed ten years ago. Yet, threats also evolve to continue seeking loopholes in security.

That’s why nowadays there are all sorts of resources to largely prevent these types of attacks. For instance, avoiding using applications that don’t encrypt data on their servers, such as Sunbird and Nothing Chats, which are already addressing the serious issue detected. Another aspect lies in habits, such as using different passwords or employing secure password managers that allow indirect entry of keys.”

Daniel García

Daniel García

Graduated in Journalism, Daniel specializes in video games and technology, currently writing for Andro4all and NaviGames, and having written for more Difoosion portals such as Alfa Beta Juega or Urban Tecno. He enjoys staying up-to-date with current affairs, as well as reading, video games, and any other form of cultural expression

Latest from Daniel García

Editorial Guidelines