In today's world due to coronavirus may people are affected, here we would like to share you a post where you will understand how hackers attacking are trying to get to steal your data
Contents
"Skilled threat actors are exploiting people's
concerns about corona-virus to spread mobile malware, including Mobiles Remote Access Trojans(MRAT's), banker Trojans, and premium dialers, via apps that claim to offer Corona virus-related information and help for users." Check Point Research said in a report which was shared with The Hacker News.
Here are the Best Antivirus Software which will help you stay safe
In a separate report published and shared with The Hacker News, cybersecurity firm Froup-IB claims to have found that most COVOID-19 related phishing emails came with AgentTesla(45%), NetWire(30%), embedded as an attachment, thereby allowing the attacker to steal personal and financial data.
This is consistent with Checks Point Research's earlier finding of hackers promoting their exploit tools on the darknet with "COVID-19" or "coronavirus" as discount codes.
16 Tricks to Protect Your Privacy Online | Easy and Fast....
The US Cybersecurity and Infrastructure Security Agency(CISA) and the UK's National Cyber Security Center(NCSC) also issued a joint advisory about fake SMS messages from senders such as "COVID-19" and "UKGOV" which contain a link to phishing sites.
Europol recently arrested a 39-years-old man from Singapore for allegedly arrested for his suspected … offences linked to S$10 million COVID-19 scams for surgical masks, hand sanitizers.
Thieves Swindle $2M From Coronavirus Preppers With Hand Sanitizer, Face Mask Scams
As people increasingly work from home and online communication platforms such as Zoom and Microsoft Teams become crucial, threat actors are sending phishing emails that include malicious files with a name such as "zoom_us_######.exe" and "Microsoft-terms_V#mu#D_#######.exe".
Ransom malware also known as ransomware, is a type of malware that prevents users from accessing their system or personal files and demands a ransom payment from the user to regain its access. … The ransom hackers have grown much smarter and they demand the ransomware payment should be sent via cryptocurrency or credit card.
This post was last modified on December 13, 2020 1:37 pm
This website uses cookies.
Leave a Comment