In today's world due to coronavirus may people are affected, here we would like to share you a post where you will understand how hackers attacking are trying to get to steal your data
1. MOBILE MALWARE Hackers Attack
"Skilled threat actors are exploiting people's
concerns about corona-virus to spread mobile malware, including Mobiles Remote Access Trojans(MRAT's), banker Trojans, and premium dialers, via apps that claim to offer Corona virus-related information and help for users." Check Point Research said in a report which was shared with The Hacker News.
Here are the Best Antivirus Software which will help you stay safe
2. EMAIL PHISHING
In a separate report published and shared with The Hacker News, cybersecurity firm Froup-IB claims to have found that most COVOID-19 related phishing emails came with AgentTesla(45%), NetWire(30%), embedded as an attachment, thereby allowing the attacker to steal personal and financial data.
3. DISCOUNTED OOF-THE-SHELF MALWARE
This is consistent with Checks Point Research's earlier finding of hackers promoting their exploit tools on the darknet with "COVID-19" or "coronavirus" as discount codes.
4. SMS PHISHING Hackers Attack
The US Cybersecurity and Infrastructure Security Agency(CISA) and the UK's National Cyber Security Center(NCSC) also issued a joint advisory about fake SMS messages from senders such as "COVID-19" and "UKGOV" which contain a link to phishing sites.
5. FACE MASK AND HAND SANITIZER SCAMS
Europol recently arrested a 39-years-old man from Singapore for allegedly arrested for his suspected … offences linked to S$10 million COVID-19 scams for surgical masks, hand sanitizers.
6. MALICIOUS SOFTWARE
As people increasingly work from home and online communication platforms such as Zoom and Microsoft Teams become crucial, threat actors are sending phishing emails that include malicious files with a name such as "zoom_us_######.exe" and "Microsoft-terms_V#mu#D_#######.exe".
7. RANSOMWARE Hackers Attack
Ransom malware also known as ransomware, is a type of malware that prevents users from accessing their system or personal files and demands a ransom payment from the user to regain its access. … The ransom hackers have grown much smarter and they demand the ransomware payment should be sent via cryptocurrency or credit card.