Detecting new electronic phishing malware, redirecting payment transactions to attackers

Recently, cyber security experts have discovered the latest type of attack from the electronic money world, silently redirecting payment transactions made to attackers instead of intended recipients.

Crime activity around the electronic money market in recent years is not something new.With people stealthily digging coins on servers and scammers using tricks and malicious code as a means of earning money, it can be said that the electronic money market is a chaotic land. there is no room for credibility, as well as miscalculation.Recently, cyber security experts have discovered the latest type of attack from the electronic money world, silently redirecting payment transactions made to attackers instead of intended recipients.

  1. US $ 1.7 billion of electronic money was beaten by hackers in 2018

How to spread

Picture 1 of Detecting new electronic phishing malware, redirecting payment transactions to attackers

This malicious software was first found on torrents from The Pirate Bay.There were several videos, such as a download for the movie 'The Girl in the Spiders Web', containing a strange .LNK file, disguised as a video file.When this file was opened, a malicious software that was able to work was found in order to hijack and manage the user's browsing experience.

Picture 2 of Detecting new electronic phishing malware, redirecting payment transactions to attackers

At first it seemed pretty harmless.This software only checks to see if the user has access to a particular website.After that, it started putting ads on websites to generate revenue for malware distributors.However, after a little more thorough analysis, it was discovered that the new malware could do much more - it tried to trick the victim into transferring electronic money into the attacker's wallet.

Attack method

Picture 3 of Detecting new electronic phishing malware, redirecting payment transactions to attackers

This malware has several different attack methods.Featured among them is the method of attack that involves appropriating a Google search query to bring malicious results to the top on the results page.In addition, the software also silently inserts ads on Google to help spreaders make more money.

Picture 4 of Detecting new electronic phishing malware, redirecting payment transactions to attackers

As you go a little deeper into analyzing code structure, you will discover that this software also possesses some more worrying attack methods.One of them specifically targeted Wikipedia.When users access Wikipedia, malware will create fake donations with links to e-wallets.Of course, this link has nothing to do with Wikipedia, instead, it will redirect the victim to the e-wallet of the malware developer.Anyone tricked by this method can't get Wikipedia's help.

Picture 5 of Detecting new electronic phishing malware, redirecting payment transactions to attackers

However, after a short time, this fraudulent approach has reached new heights by automatically detecting whenever a BitCoin wallet link appears on the site.When it finds a link for BitCoin, it will silently replace the link with a fake link, redirecting it to the e-wallet of the malware's distributor.If you've never seen an e-wallet link before, keep in mind that they may be alphanumeric strings that seem to be randomized.After all, unless you are a person with knowledge of cryptocurrency on security, if not, distinguishing your real wallet links and fake wallet links is almost impossible.

  1. 1.6 million computers in Vietnam were erased by the virus, losing nearly 15,000 billion in 2018

How to prevent

The good news is that dealing with this malware is not too difficult.As mentioned, malicious code is only released when users download a movie on The Pirate Bay, then open a fake file containing malicious code.So how to distinguish the fake file?Very simple!If you notice, the fake file will use the .LNK extension, remember, media files that contain videos never appear in this .LNK format.Therefore, if careful, users will not be fooled by this trick.

Picture 6 of Detecting new electronic phishing malware, redirecting payment transactions to attackers

This shows the importance of checking files before you download or run them, especially from illegal or unreliable sources.Make a habit of carefully observing and learning strange files and links downloaded from the Internet and you can't be sure whether it's safe or not.

  1. Ham hacked the game, the boy made the computer infected with virtual money and ruined it

summary

The emergence of this new electronic money scam software reminds us of the importance of the principles of safety when using computers, in particular here is to carefully check the files downloaded from Unknown source.What do you think about this new malware and how it works?Please leave a comment in the comment section below.Wish you have the necessary sanity when using the Internet!

See more:

  1. Japan urges white-hat hackers to hack insecure IoT devices ahead of the 2020 Olympics
  2. Azorult Trojan steals user passwords while running in the background like Google Update
  3. Hacker purged two-factor security just by automated phishing attacks
  4. The provisions of the Criminal Code relate to the field of information technology and telecommunications networks
Update 23 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile