STRRAT data-stealing malware now posing as a Ransomware…!!

Malware Attack

Amid the global pandemic here comes a new series of tweets from the OS giants Microsoft, where they have warned with a “massive email campaign; that’s pushing of a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection.”

STRRAT whic is a java based remote access tool which steals browser credentials, logs keystrokes and takes remote control of infected systems—all typical behaviors of RATs, MSI researchers described in documentation posted on GitHub about the malware.

This is a malware that has a unique feature i.e. “its a ransomware encryption/decryption module” that changes file names in a way that would suggest encryption is the next step.

How does it cause a damage?

Attackers used compromised email accounts to send several different emails. Some of the messages use the subject line “Outgoing Payments.”

STRRAT has first emerged in the threat landscape in June 2020, observing the Windows malware (version 1.2) in phishing emails containing malicious Jar (or Java Archive) attachments.

For more information on these, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin:

The technology behind RoBooCoP…!


As we go around the globe we see that we all are facing this pandemic situation even now when we are near to the mid of 2021 but we still are facing this crises caused by COVID19 . We at DocTooLss believe that all our readers and followers are staying at home & following the COVID SMS rule i.e.

SMS Rule

  • Social Distancing
  • Masking
  • Sanitizing

So now coming to our topic of Robotic technology , I guess we would be aware about Star Trek movies , The Robocop series or during our childhood we must have seen technology based cartoons such as “The Jetson’s” which use to get aired on “Cartoon Network” or the stone age cartoon “The Flintstones” which was just a opposite of “The Jetson’s”.

Now in 2021 we have come across with many robotic technology based machines and could even purchase from our very own e-commerce website

There are robotic based vacuum cleaners, the automatic drones, Alexa, Siri the voice assistance are some of the examples in AI and Machine Leaning technology .

What are Robots?

Robots are the intersection of science, engineering and technology that produces machines.

Types of Robots

Pre-Programmed Robots

Humanoid Robots

Autonomous Robots

 Teleoperated Robots

Augmenting Robots

Uses of Robots






Differences between Cobots & Robots 

Cobots are designed to work alongside human employees, whereas industrial robots work on their own. A cobot can assist human employees. Whereas, industrial robots are used to automate the manufacturing process independently without any intervention from humans.

For more information on these devices, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin:

Let’s Dig Down in AWS…!!

EC2 by AWS

As we know that there are many services which are offered by AWS , lets pick few and try to understand their usage and utility it has for us:

AWS EC 2 (Virtual Servers on Cloud)

  • EC2 stands for Elastic Compute Cloud
  • It is one of the most famous offerings by AWS
  • It is a IaaS platform
  • It is basically renting of VMs
  • Storing data on Virtual Drives (EBS , ELB) and Distributing load across machines
  • Scaling of service using an auto-scaling group (ASG)

There are wide variety of Amazon EC2 Instance types comprise varying combinations of CPU, memory, storage, and networking capacity that gives you the flexibility to choose the appropriate mix of resources for your applications.

Each instance type includes one or more instance sizes, allow you to scale your resources either up or down and in or out to the requirements of your target workload.

Types of EC2 Instance Types

  • General Purpose
  • Memory Optimized
  • Compute Optimized
  • Accelerated Computing
  • Storage Optimized
InstancevCPU*CPU Credits / hourMem (GiB) StorageNetwork Performance
t2.micro161EBS-OnlyLow to Moderate
t2.small1122EBS-OnlyLow to Moderate
t2.medium2244EBS-OnlyLow to Moderate
t2.large2368EBS-OnlyLow to Moderate

T2 instances – General Purpose Instance

Source: AWS Website , for more information, click here

EC2 Purchase Options

  • On-Demand Instance
  • Reserved Instance, Convertible Instance and Scheduled Reserve Instance
  • Spot Instance
  • Dedicated Hosts and Dedicated Instance

For more information on these, contact the undersigned

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin:

What is EC2 Image Builder?

EC2 Image Builder is a fully managed AWS service that makes it easier to automate the creation, management, and deployment of customized, secure, and up-to-date “golden” server images that are pre-installed and pre-configured with software and settings to meet specific IT standards.

The guided steps by EC2 Image Builder:

  • Provide starting artifacts
  • Add and remove software
  • Customize settings and scripts
  • Run selected tests
  • Distribute images to AWS Regions

Features of EC2 Image Builder

  1. Increase productivity and reduce operations for building compliant and up-to-date images
  2. Increase service uptime
  3. Raise the security bar for deployments
  4. Centralized enforcement and lineage tracking
  5. Simplified sharing of images across AWS accounts

For more information on these devices, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin:

Services by AWS


Databases (DB) in AWS : These are stored on EFS, EBS, EC2 , Instances , S3

  • Relational DB : – These are like Excel spreadsheets , which can use SQL language to perform Lookups.
  • No SQL DB: – It is build for specific purpose/data, flexible schemes.

Benefits of DB:

  • Flexibility
  • Scalability
  • High Performance
  • Highly Functional

Benefits of AWS:

  • Quick Provisioning
  • High Availability (HA)
  • Vertical & Horizontal Scaling
  • Auto Backup & Restore
  • OS Monitoring
  • Alerting


Relational DB service managed for DB use SQL as a query language. It allows you to create db in the cloud.

Kinds of RDS
  • PostGress
  • My SQL
  • Maria DB
  • Oracle
  • MSSQL Server
  • Aurora (AWS property DB)

Amazon Aurora

It is a proprietary tech from AWS:

  • Post gresSQL & mySQL are both supported
  • Cloud Optimized
  • 5X performance improvement
  • Storage auto grows increments of 10 GB
  • Cost 20% RDS, more efficient

Note: Aurora is cloud native AWS RDS technology based to manage service.

Note: Relational DB will look like a Excel doc or .csv with relations between tables.

Database Migration Service

It helps you to migrate db to AWS quickly & securely. It minimizes downtime to app.

Amazon ElasticCache

  • It is use to get managed redis or memcached
  • These are in-memory db with high-performance


  • It is fully managed highly available with replication across 3 AZ
  • No SQL DB
  • Serverless DB
  • Million of request
  • Integrated with IAM
  • Data type – Key/value d/b


It is based on Postgress SQL, but not for OLTP (online transition processing)

  • 10 x better performance than other db warehouses
  • Massively parallel query execution
  • Pay as you go based
  • Has a SQL interface for performing the queries
  • Integrated with BI Tools

Amazon EMR

  • Elastic Map Reduce
  • Creates Hadoop Clusters (Big data) analyze process vast a mount of data
  • Apache, Spark , KBase
  • Autoscalling

AWS Athena

  • Fully Serverless db with SQL cap
  • used for query data in S3
  • Pay per query
  • o/p resul back to S3

Note: One-time SQL queries serverless queries on S3 , log analytics

For more information on these devices, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin:

IoT the Next CobWeb

IoT the Next CobWeb

In the world today where we are breathing through masks, due to the pandemic times, where mostly all are working from home. Businesses need to be automated. In a real business scenario where we would have some technical glitches or a bearing failure whereby the service technician would file a complaint, either by creating or raising a ticket physically over a tablet or laptop, but with IoT it will sensorise the oil well with more fine crane monitoring the data and analytics and read a conclusion as there will be a bearing failure in future. The automation will create a fixed ticket automatically, detecting through IoT and remediate it through choreographically.  

As per Gartner by 2024, 50 % of the enterprise’s applications in production will be IoT- enabled. Many applications will be connected to IoT as companies have connected IoT to their backhand systems.

The benefits of IoT and the widespread of IoT:

  • IoT enables your business applications to improve how you perform your business.
  • By 2023, 35% of midsize to large enterprises will leverage a hybrid cloud-to-edge computing deployment model for at least one IoT project.
  • By 2023, 25% of on-site industrial assets will be connected by closed-loop systems using IoT technologies.

Source: Gartner survey

Some of the IoT devices to be used :

  • BrainCube by Brain Cube
  • Kloudq IIoT by Kloudq Technologies
  • PTC ThingWorx by PTC
  • Oracle IoT cloud by Oracle
  • Azure IoT
  • IBM Watson IoT by IBM

For more information on these devices, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:| Linkedin:

Cyber Strategies in the New Normal

We have nearly reached the end of this pandemic year 2020, where mostly we have spent our time at home as still when we write this blog many would be working from home and some who have joined their work task force are trying to adjust the new normal.

This year where not even the IT officials but the students or kids are attending their classes from home. Since everyone is working from home there has been an increase in bandwidth and data utilization around the globe.

The organization which has a business continuity plan ready had a smooth transformation to work from the environment without any hindrances it was proved that CS having a foresight had an efficient way for the organization. A new area of cyber is cyber innovation, risk is mitigated risk is all about taking a risk. Cyber innovation is an area to look at. 

As per Gartner, there are five principles:
  • Continuous adaptive risk and trust assessment based on agility.
  • Secure DevOps
  • Replace the one-time security gate
  • Put the continuous security pro-actively 
  • Build the architecture with security, not with silos 

The average knowledge about cyber-attack prevention is deficient. Yes, cybercriminals are getting better all the time. But if we become proactive in our approach instead of reactive, they can be pushed back continually and hopefully sit mostly on the drawing board!

There is some positive aspect of COVID 19, that it has helped companies to identify that employees to work from their living room, whereas lots of expenditure has been spent on companies infrastructure. Even our environment which has been polluted has been saved by not using the vehicles on a daily basis. 

So, things to keep in mind during this pandemic is to secure your computer systems and wear a mask to protect yourself and others around you.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Linkedin:

What is Web Application and OWASP?


OWSAP – Open Web Application Security Project is a non-profit organization that dedicates web application security.

What is the OWASP Top 10?

It lists out the top 10 vulnerabilities and shows their risks, impacts, and countermeasures. It is updated every 3 – 4 years with the latest vulnerabilities.

Although in 2020 the world has been taken by a storm due to the pandemic COVID19. The people around the world whether the employees or students all were working from home. So since the home networks are not that secure compared to the official network so the chances of breach increases. Here we highlight the top 10 vulnerabilities as per OWASP.

The Top 10 OWASP vulnerabilities in 2020 are:

  • Injection
  • Broken Authentication
  • Sensitive Data Exposure
  • XML External Entities (XXE)
  • Broken Access control
  • Security misconfigurations
  • Cross-Site Scripting (XSS)
  • Insecure Deserialization
  • Using Components with known vulnerabilities
  • Insufficient logging and monitoring



A code injection happens when an attacker sends invalid data to the web application with the intention to make it do something that the application was not designed/programmed to do.

Broken Authentication

It is an umbrella term where several vulnerabilities where attackers exploit to impersonate legitimate users online.

Sensitive Data Exposure

It consists of compromising data that should have been protected.

XML External Entities (XXE)

This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser.

Broken Access control

The vulnerabilities that exist when a user can, in fact, access some resource or perform some action that they are not supposed to be able to access.

Security misconfigurations

It occurs when a web application component is susceptible to attack due to a misconfiguration or insecure configuration option.

Cross-Site Scripting (XSS)

It is a widespread vulnerability that affects many web applications. XSS attacks consist of injecting malicious client-side scripts into a website and using the website as a propagation method.

Insecure Deserialization

A vulnerability which occurs when untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS) attack, or even execute arbitrary code upon it being deserialized.

Using Components with known vulnerabilities

Vulnerabilities that were discovered in open source components and published in the NVD, security advisories or issue trackers.

Insufficient logging and monitoring

Insufficient logging, detection, monitoring and active response occurs at any time: * Auditable events, such as logins, failed logins, and high-value transactions are not logged.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Linkedin:

What do you mean by Virtualization & Hypervisor?


Virtualization refers to the creation of a virtual resources such as a server, desktop, operating system, file, storage or network.

A simple definition of virtualization is the formation of virtual computer inside the real computer.


  • Reduces IT expenses
  • Increases Efficiency
  • Increases Agility

Ways of creating virtualization

  • Full virtualization,
  • Para-virtualization 
  • OS-level virtualization.

Types of Virtualization

1.Server Virtualization
2.Application Virtualization
3.Network Virtualization
4.Desktop Virtualization
5.Storage Virtualization

Server Virtualization

Server virtualization allows multiple servers to be installed on one or more existing servers. This saves floor space and money since you don’t have to purchase new servers or expand the square footage of your server room which may increase your overall expenses.

Application Virtualization

This is a process where applications get virtualized and are delivered from a sever to the end user’s device, such as laptops, smartphones, and tablets. So instead of logging into their computers at work, users will be able to gain access to the application virtually from anywhere, provided that an Internet connection should be available.

Network Virtualization

Network virtualization is a method of combining available resources in a network by splitting up the available bandwidth into channels, each of which is independent from the others, and each of which can be assigned (or reassigned) to a particular server or device in real time. Each channel is independently secured.

Desktop Virtualization

Desktop virtualization removes the need for a CPU at each computer station. Each user will still have a monitor and mouse, but will have their desktop CPU virtually stored on a local server.

Storage Virtualization

Storage virtualization is the process of grouping the physical storage from multiple network storage devices so that it looks like a single storage device. This concept is basically used in Storage Area Network (SAN) environment.


A Hypervisor or Virtual Machine Monitor(VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called guest machine. 

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website:| Tumblr: | Medium:| Facebook:  | Linkedin:

Website Built with

Up ↑

Create your website with
Get started