Can transcend into binary code, cloaked in invisibility, waiting for the right vulnerability and opportunity to enter your system and begin his path of destruction. Once inside, he is very hard to detect or remove.
Br3ach3r can enter a system through secret communication tunnels that allow hackers to control a system and steal its data. He can gain access via infected files, emails or other media, compromising the system and claiming root.
Once in control of your operating system, he can manipulate your code to open backdoors and tunnels that can be used to deploy other malicious software. Br3ach3r is also a gateway for viruses to leave the Dataverse and enter the real world!
Br3ach3r originated as a trojan released in 2000, causing $10 billion in global losses and listed as the world’s most damaging cyberattack. Br3ach3r was distributed as a phishing email with the subject line: “Please Review My Updated Proposal”, and coupled with an attachment named “MasterPlan” which was disguised as a harmless .pdf. Those that were susceptible to this attack and unwittingly opened the attachment became immediately infected. Br3ach3r would then attempt to overwrite your files and then send himself out to your entire list of contacts, repeating the cycle. This simple but effective propagation method enabled Br3ach3r to infect millions of computers.