The infamous Emotet malware has caused trouble again, according to researcher sources.
Back in 2014, Emotet was founded as a banking trojan, deciding on third party malware after using their own. This produced a handful of malicious spamming and stealing personal information.
Tech Radar states on their blog, “In May of last year, Proofpoint researchers observed Emotet delivering third-party payloads including Qbot, The Trick, IcedID and Gootkit. The malware also now loads modules for spamming, credential stealing, email harvesting and spreading via local networks.”
Last week, researchers found an astounding 250,000 e-mails sent out by Emotet after 5 months of inactivity. These e-mails include links with Microsoft Word and will download and install malware to the computer. In turn, hackers can receive any and all data they want.
Companies are the biggest target for Emotet, and come with a hefty problem if not combated with anti-virus software. It’s always best to remember not to open e-mails or attachments that are unknown to the user.
*Update 7/21 – A new scam for a Google Chrome update is circulating around the world, zoning in on multiple organizations. These e-mail scams will download malware if the links are clicked on. Keep an eye out.
For help with computer issues, call us at 1-800-620-5285. Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Mesa Computer Repair Service, if you need computer repair in Mesa, AZ please call the local office at (480) 240-2950.
Late last month, security analysts recognized a hijack of the Phorpiex botnet.
Phorpiex Botnet is a 10 year old network that has spread malware and has affected computers all across the world. And if you have this particular malware on your computer, you may have found a pop-up message saying “Please install AntiVirus Software and update your computer!”
At first, security analysts thought it was a prank by the Phorpiex network. However, they soon realized that the malware was slowly dissipating from those affected.
Though there’s no definite explanation for this, some say that it’s possible another malware network hacked into the Phorpiex system so they would lose funds. Competition seems to heighten in the cyber-criminal world.
To avoid these, and other malware problems on your PC, make sure to keep your operating system up to date and have the latest anti-virus software installed.
If you receive an e-mail about installing Windows 10 updates, just delete it. A new ransomware has been found, urging users to install the latest Windows 10 update. The subject line shows either ‘Install Latest Microsoft Windows Update now!’ or ‘Critical Microsoft Windows Update!’ and once opened, a file extension attachment will show up for you to click on.
This malicious download will infect any computer that downloads the “.jpg” file extension. TechRadar reported that the download, “encrypts all of the files on the infected user’s system and appends their filenames with its own file extension, 777. A ransom note with the filename ‘Cyborg_DECRYPT.txt’ is then left on the desktop of the compromised machine. Finally the ransomware leaves a copy of itself called ‘bot.exe’ hidden at the root of the infected drive.”
The file is called ‘bitcoingenerator.exe’ and the GitHub account it’s from is named “misterbtc2020”. This ransomware can lock your PC and your files be encrypted, and for a ransom, you can receive your files as decrypted.
Make sure your antivirus is up to date on your computer to avoid any and all malicious cyber attacks. Also, remember that Windows 10 updates are only pushed through its operating system and not through e-mails.
If you ever have an issue with any Windows 10 updates, give us a call at 1-800-620-5285. Karls Technology is a nationwide computer service company with offices in many major cities. This blog post was brought to you from our staff at the Garland Computer Repair Service, if you need computer repair in Garland, TX please call or text the local office at (469) 299-9005.
New phishing emails that contain trojan malware are spreading, according to experts. The malware, named Ursnif, is contained in Word documents through emails and allow cyber hackers to steal personal credentials.
Ursnif isn’t the first of its kind, however. It was reported that this particular variant has been around since 2007 and specifically targets Windows OS. Fortinet, a top-rated security platform, recently stated this threat to be highly active.
“When a victim opens the Word document, it displays a security warning message designed to protect MS Word users from malicious macros (VBA code). However, the document content deceives victims to click the “Enable Content” button, as shown in Figure 1. When the button is clicked, the malicious VBA code is executed because the code is in an AutoOpen sub that is executed at opening the document.”
It’s highly advised that you do not open any documents through e-mails unless you know exactly who it is from. Be sure to double check the address it was sent from as well. Many times, the name will show up legit, but the email address itself does not match.