Detecting new electronic phishing malware, redirecting payment transactions to attackers
Recently, cyber security experts have discovered the latest type of attack from the electronic money world, silently redirecting payment transactions made to attackers instead of intended recipients.
Crime activity around the electronic money market in recent years is not something new.With people stealthily digging coins on servers and scammers using tricks and malicious code as a means of earning money, it can be said that the electronic money market is a chaotic land. there is no room for credibility, as well as miscalculation.Recently, cyber security experts have discovered the latest type of attack from the electronic money world, silently redirecting payment transactions made to attackers instead of intended recipients.
- US $ 1.7 billion of electronic money was beaten by hackers in 2018
How to spread
This malicious software was first found on torrents from The Pirate Bay.There were several videos, such as a download for the movie 'The Girl in the Spiders Web', containing a strange .LNK file, disguised as a video file.When this file was opened, a malicious software that was able to work was found in order to hijack and manage the user's browsing experience.
At first it seemed pretty harmless.This software only checks to see if the user has access to a particular website.After that, it started putting ads on websites to generate revenue for malware distributors.However, after a little more thorough analysis, it was discovered that the new malware could do much more - it tried to trick the victim into transferring electronic money into the attacker's wallet.
Attack method
This malware has several different attack methods.Featured among them is the method of attack that involves appropriating a Google search query to bring malicious results to the top on the results page.In addition, the software also silently inserts ads on Google to help spreaders make more money.
As you go a little deeper into analyzing code structure, you will discover that this software also possesses some more worrying attack methods.One of them specifically targeted Wikipedia.When users access Wikipedia, malware will create fake donations with links to e-wallets.Of course, this link has nothing to do with Wikipedia, instead, it will redirect the victim to the e-wallet of the malware developer.Anyone tricked by this method can't get Wikipedia's help.
However, after a short time, this fraudulent approach has reached new heights by automatically detecting whenever a BitCoin wallet link appears on the site.When it finds a link for BitCoin, it will silently replace the link with a fake link, redirecting it to the e-wallet of the malware's distributor.If you've never seen an e-wallet link before, keep in mind that they may be alphanumeric strings that seem to be randomized.After all, unless you are a person with knowledge of cryptocurrency on security, if not, distinguishing your real wallet links and fake wallet links is almost impossible.
- 1.6 million computers in Vietnam were erased by the virus, losing nearly 15,000 billion in 2018
How to prevent
The good news is that dealing with this malware is not too difficult.As mentioned, malicious code is only released when users download a movie on The Pirate Bay, then open a fake file containing malicious code.So how to distinguish the fake file?Very simple!If you notice, the fake file will use the .LNK extension, remember, media files that contain videos never appear in this .LNK format.Therefore, if careful, users will not be fooled by this trick.
This shows the importance of checking files before you download or run them, especially from illegal or unreliable sources.Make a habit of carefully observing and learning strange files and links downloaded from the Internet and you can't be sure whether it's safe or not.
- Ham hacked the game, the boy made the computer infected with virtual money and ruined it
summary
The emergence of this new electronic money scam software reminds us of the importance of the principles of safety when using computers, in particular here is to carefully check the files downloaded from Unknown source.What do you think about this new malware and how it works?Please leave a comment in the comment section below.Wish you have the necessary sanity when using the Internet!
See more:
- Japan urges white-hat hackers to hack insecure IoT devices ahead of the 2020 Olympics
- Azorult Trojan steals user passwords while running in the background like Google Update
- Hacker purged two-factor security just by automated phishing attacks
- The provisions of the Criminal Code relate to the field of information technology and telecommunications networks
You should read it
- Stealing, electronic money scams in 2019 may hit a record of $ 4.3 billion
- US $ 1.7 billion of electronic money was beaten by hackers in 2018
- The Cuban government considered using electronic money to overcome US sanctions
- The biggest problem with Facebook's electronic currency: Trust
- 'People play' electricity from nuclear power plants to exploit electronic money
- 7 best safety wallets for Bitcoin and other electronic currencies
- Discovery of Trojan scattering steals virtual money through YouTube
- What is Cryptojacking and how to combat this malware?
- 32 million dollars 'evaporated' in the hack of Bitpoint electronic money trading floor
- President Trump: 'I'm not a fan of Bitcoin or any other electronic money'
- The journey halfway around the world finds back 200,000 dollars bitcoin
- Chia Network launched an electronic money development contest with a total prize value of up to 2.3 billion VND
Maybe you are interested
How to Identify Pure Sandalwood Powder 10 tips to help reduce stress fatigue for office workers can be applied immediately What does Google Penguin mean for businesses? Hot weather can make you sad and don't want to help others Warning signs of your body eating too little vegetables When tired, change your life in these 12 simple ways