Looptorrent.net Safe

0 views
Skip to first unread message

Faith Lienhard

unread,
Aug 5, 2024, 11:56:50 AM8/5/24
to acsmalaleed
Whensearching for necessary software, users often visit seemingly safe websites and torrent trackers to download, install and use programs. But are these programs truly safe? Illegal software could contain threats of all kinds, from miners to complex rootkits. The danger of malware spreading through dubious software downloads is not new and has now reached a global scale. Let's discuss this, taking the study of a specific attack as an example.

Through in-depth analysis of the malware, the infection chain, and the Telegram bot, our team managed to identify a large number of victims worldwide and determine the likely creator of the malware, which we named "autoit stealer".


Most victims were non-corporate users downloading illegal software to their home computers. However, among the victims, we discovered government entities, educational institutions, oil and gas companies, medical facilities, construction, mining, retail and IT companies, and others. All the identified companies were duly notified.


After downloading the torrent, the victim's computer receives an infected installer of the program they wanted to get. Besides the legitimate software, the installer also contains a malicious component, consisting of numerous individual programs, mostly compiled AutoIt scripts additionally obfuscated with the Themida packer. The implementation of the malware doesn't look too complicated; it's pretty textbook and uses simple attack tactics. The infection chain involves the following actions (the most important points will be accompanied by screenshots from MaxPatrol SIEM).


It's worth dwelling for a moment on the theft of the Telegram user folder, tdata. By obtaining this folder, the attacker can access a user's Telegram session, secretly monitor their conversations, and extract data from the account. The attacker's device will not be shown in the list of devices. If the user has set up a password as the second authentication factor for accessing messages, the hacker can covertly bruteforce. If traces of compromise are detected, the user must terminate the current session and log into Telegram again.


When analyzing the malicious component responsible for transmitting collected information from the infected machine, we obtained the token_id of the bot to which all the information was sent. By obtaining all the messages from this bot, we identified the first user who launched it, splokk.


On another social network, hacker has the nickname cdjsend. Having discovered that hacker uses this nickname, we were able to see what kind of messages he left on the forums. The nickname is unique and is mainly used on Russian-speaking forums dedicated to topics such as PC components and PC administration.


It's worth highlighting the user's activity on the autoit-script.ru forum dedicated to AutoIt, a programming language designed to create automatic scripts for Windows programs. (The original malware was written in AutoIt.) So far, cdjsend has left 67 messages there.


This correspondence shows cdjsend encountering an error with an empty msgbox. If you compare the code from the malicious program we are analyzing and the code in these posts, they turn out to be almost identical. In the original code, $Query is passed directly with a link to the Telegram bot and the corresponding token, but in the malicious code, a function is used. The function in the malicious code also returns its result differently, replacing the code that cdjsend had problems with, as can be seen in the messages above.


Considering the code itself along with the fix, the posts on social networks, and the messages on other forums, we can conclude there is a significant overlap between hacker and the user splokk, who is associated with the malware.


Using illegal software carries the risk of malware infection. While a regular antivirus can provide some protection, it is not a panacea: users should be mindful when selecting software sources. Ideally, it's best to buy a licensed program, although this might not always be feasible in the current circumstances.


The malware used in the attack is not difficult to analyze. Studying just one attack using it revealed information about over 250,000 victims worldwide. We believe the actual number of victims is significantly higher, and we anticipate a rise in attacks using compromised illegal software.


Good news! looptorrent.net seems FREE to be registered! This domain used to be online but now seems it has been taken down. Last time we saw it online was 2 months ago (16-05-2024). You can check their old records bellow this message. Do you want to buy it and be the new owner? We can help you!


Finding reliable and secure torrent sites for music can be tricky. Many track your web data and contain malware. Poorly moderated music torrent sites also have slow speeds (due to a low number of seeders), numerous inactive torrents, and low-quality releases.


The Pirate Bay is among the most popular torrent sites, known for its vast media collection that includes plenty of music. In addition to songs, albums, and discographies from across the world, The Pirate Bay also offers live concert videos and audio software. This site has a large user base with many seeders available for fast downloads. The average download speed for music files is 6Mbps.


Finding your desired content (including niche genres like gospel, classical, J-pop, or Hindi songs) is a breeze, thanks to its user-friendly interface and effective search engine. You can filter your search results by category, type, and file format. This tracker also features a top 100 list that showcases the most popular audio releases. Most of them are available in high-quality 320kbps MP3 or FLAC formats.


RARBG is another well-known torrent website with a broad selection of copyright-free music. The site offers torrents from a diverse range of music genres, with multiple formats and qualities (from FLAC to MP3). RARBG also has an intuitive and clean interface to easily search for music files.


AudioNews is another private torrent tracker specializing in audio production and editing software for all popular operating systems. The site offers a wide selection of free professional tools for musicians, producers, and sound engineers. However, newcomers can find a wealth of learning materials and samples.


The site opens registration for new users every first day of the month. You may be invited if you actively upload files for the first 30 days. If invited, you must maintain a seed-to-leech ratio of at least 0.8 to keep using the tracker. All of this is compensated with excellent moderation and extra-fast speeds.


Nyaa Torrents (also known as Nyaa.si) is a great place to find Japanese music and anime-related soundtracks. It has a dedicated community of enthusiasts who ensure the tracker only contains Japanese content. You can sort torrents by relevant tags or the number of seeders. The site contains magnet links for instant file downloads too.


The site is regularly monitored for malware, viruses, and fake torrents. Notably, many school and workplace networks block access to Nyaa.si. However, ExpressVPN let me reliably access Nyaa in my tests, despite network restrictions.


Most of its content is only available in English, but you can find songs in other languages too. Just bear in mind that 1337X is usually blocked on restrictive networks, so you might need a quality VPN to access it.


Without a VPN, you may be unable to access music torrent sites due to blocks. Some restrictive networks, like those found in workplaces or schools, commonly block access to music torrenting sites. DNS filtering and other methods are used to monitor your connection and prevent you from accessing certain torrenting platforms.


Military-grade encryption also keeps your connection secure and private. Your data is ciphered with the same standard used by the NSA, making your activities unreadable to prying eyes. ExpressVPN also never leaked my real IP address during my tests, meaning my actual location and identity were never at risk while torrenting music. Plus, Network Lock (a kill switch) prevents data exposure by terminating your internet connection if the VPN tunnel suddenly drops.


On the downside, the monthly plans are quite expensive. That said, ExpressVPN frequently offers generous discounts with long-term plans. I opted for the 12-month subscription to get 49% off and get 3 extra months for free, for a final price of just $6.67/month. ExpressVPN is also backed by a 30-day money-back guarantee, so you can test it without risk.


Dedicated P2P servers make CyberGhost an excellent choice for fast and secure music torrenting. These specialized servers are optimized for delivering consistently fast speeds for torrenting in particular. To find the best torrenting server for me, I simply navigated to the For Torrenting tab in the app and selected the closest server (shorter distances equal better speeds). I downloaded a 1.43GB copyright-free album in just a few minutes.


PIA offers the ability to port forward, which increases your download speed on music torrents by letting you connect to more peers. This can easily be done straight from the VPN app by checking a box. Even without port forwarding, I got speeds of 82Mbps on the New York server, a drop of just 36%.


Editor's Note: We value our relationship with our readers, and we strive to earn your trust through transparency and integrity. We are in the same ownership group as some of the industry-leading products reviewed on this site: Intego, Cyberghost, ExpressVPN, and Private Internet Access. However, this does not affect our review process, as we adhere to strict testing methodology.


I created this table to help you compare the most important torrenting features. I focused on P2P support, average speeds, and obfuscation, which is useful in evading restrictive VPN-blocking firewalls. They are the most essential features for safe, fast, and reliable torrenting.

3a8082e126
Reply all
Reply to author
Forward
0 new messages