Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Tech

Cyber experts warn of new Chrome, Microsoft money stealing malware

A new and sophisticated malware that impersonates Google Chrome and Microsoft has the potential to steal money from Microsoft device owners, cyber experts warn.

Since March, online protection firm Proofpoint has flagged an ongoing nefarious campaign, seeing “cybercriminal threat actors adopting new, varied, and increasingly creative attack chains.”

This month, Proofpoint identified a larger distribution of the malware. It poses as fake updates in internet browsers like Chrome and mimics programs like Microsoft Word — all to coerce users into downloading a harmful series of code.

A sophisticated cyber attack can imposter popular programs. Brian Jackson – stock.adobe.com

From there, the delayed, Trojan Horse-esque attack gets access to cryptocurrencies and to sensitive files and personal information.

Often, a pretend update prompt will pop up on Google Chrome through a “compromised website” with a clipboard message to “copy the code” provided. It then instructs personal computer owners to open PowerShell — a Microsoft program for scripts — and self-paste in the malware.

The malware will imitate Google Chrome. Proofpoint

From there, the “hijacker” can gain access to the victims’ cryptocurrency.

Specifically, this ploy reroutes the victim’s funds to the perpetrator rather than to the rightful recipient.

Another method of this is through “email lure,” a ploy similar to phishing.

Emails, typically those that appear to be work- or corporate-related, will contain a hypertext markup language file that resembles Microsoft Word and has a variety of error messages.

“Word Online’ extension is not installed,” one read along with phony buttons to click on to “fix” it.

Similarly, users were prompted to open PowerShell and copy over a malicious code, in a deceptive “campaign” that, according to Proofpoint, was widespread.

The malware also resembles Microsoft Word. Proofpoint

Per Proofpoint, “the campaign included over 100,000 messages and targeted thousands of organizations globally.” 

In a similar fashion, Microsoft’s cloud storage, OneDrive, was also mimicked for nefarious purposes.

“The social engineering in the fake error messages is clever and purports to be an authoritative notification coming from the operating system,” Proofpoint noted.

“It also provides both the problem and a solution so that a viewer may take prompt action without pausing to consider the risk.”

Other programs like Microsoft OneDrive are imitated by the malware. Proofpoint

However, there is a silver lining in that “this attack chain requires significant user interaction to be successful.”

So, in other words, be smart and never download anything that looks unauthorized or suspicious.

Widely popular browsers and programs like Chrome and Word will never prompt a user to manually input code into another application for basic functions.

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button