SELECT LANGUAGE BELOW

Beware of encrypted PDFs as latest trick to deliver malware to you

Join Fox News for access to this content

Plus, your account will give you exclusive access to select articles and other premium content for free.

Please enter a valid email address.

Enter your email address[続行]By pressing , you agree to Fox News’ Terms of Use and Privacy Policy, including notice of financial incentives. Please check your email and follow the instructions provided to access the content.

Need help? Click here.

Russian-backed hackers are stealing information using malware disguised as PDF encryption tools.by Threat Analysis Group ReportColddrive sends encrypted PDFs to victims.

When unsuspecting victims reply that they cannot view the PDF, the group sends a download link disguised as an encryption tool. But it’s really malware.

According to the Threat Analysis Group (TAG), a specialized team within Google that focuses on identifying and countering a variety of security threats, Colddriver primarily addresses the following threats: Phishing attack. Therefore, this new malware-based attack is relatively new territory for this group.

Click to get the free Cyber ​​Guy Newsletter in your cart with security alerts, quick video tips, tech reviews, and easy how-tos to get smarter

Colddriver backdoor malware attack

The attack itself is very simple. As mentioned above, the attacker sends an encrypted PDF and, when the victim responds, sends an “encryptor” containing malware. The “encryption tool” may even display fake PDF documents to actually sell the ruse. However, he actually backdoors the device with malware called Spica.

Russian malware compromises Department of Energy and other federal agencies

Spica steals cookies from Google Chrome, FireFox, Edge, and Opera to obtain your information. According to Google, Colddriver has been in use since September 2023, although there are instances where Colddriver dates back to 2022.

Google announced that it has added all domains, websites, and files involved in the attack to its Safe Browsing service. The company also notified targeted users that they were at risk of an attack.

PDF malware 2

data on the internet (Kurt “Cyber ​​Guy” Knutson)

Read more: How cryptocurrency scammers regularly use them to infect Macs with malware

how to protect yourself

1. Do not download pirated software. It’s not worth the risk to download pirated software. This exposes your device to potential security threats such as viruses and spyware. If someone sends you a download link via email, make sure it comes from a trusted source and scan it. Downloading software from a trusted app store is a surefire way to protect your device.

2. Don’t click on suspicious links or files. If you come across a link that looks suspicious, misspelled, or unfamiliar, don’t click it. Instead, consider visiting the company’s website directly by entering the web address manually or by searching with a trusted search engine. In most cases, The first or second result you see is legitimate. If you see the word “Sponsored” above the search results, wait a moment before clicking on it, and then consider clicking on the result below it.

PDF malware 3

A hacker is trying to steal your data (Kurt “Cyber ​​Guy” Knutson)

3. Update your device regularly with software. regularly Update your device software This is critical for security as it ensures you receive the latest patches, bug fixes, and security enhancements. These updates help protect your device from vulnerabilities and potential threats that could be exploited by malicious attackers.

4. Use good antivirus software. The best way to protect yourself from clicking on malicious links that install malware that can access your personal information is to install antivirus protection on all your devices. This can also alert you to phishing emails and ransomware scams. Get my picks for the best antivirus protection products of 2024 for your Mac, Windows, Android, and iOS devices.

More information: How hackers exploit Windows Smart Screen vulnerabilities to spread malware

What to do if you get hacked

If a hack has already occurred and you have been hacked, you should take immediate action to minimize the damage and protect your device. Below are some steps you can take.

change password

If hackers have recorded your passwords, they can access your online accounts and steal your data and money. You should change the passwords for all important accounts, such as email, banking, and social media, on another device (such as a laptop or desktop). I would like to do this on a separate device so hackers don’t record it. Set a new password on your hacked device. You should also use strong, unique passwords that are difficult to guess or crack.You can also use password manager Generate passwords and store them securely.

Enable two-factor authentication

must be activated two-factor authentication For an extra layer of security.

Monitor your account and transactions

You should regularly check your online accounts and transactions for suspicious or fraudulent activity. If you notice anything unusual, please report it to your service provider or authorities as soon as possible. You should also check your credit report and score for signs of identity theft or fraud.

PDF malware 4

hacker on the internet (Kurt “Cyber ​​Guy” Knutson)

Use identity theft protection

Identity theft protection companies monitor your personal information, such as your household title, social security number (SSN), phone number, and email address, and alert you if it is used to open an account. It can also help freeze bank and credit card accounts to prevent further misuse by criminals. Check out our tips and recommendations on how to protect yourself from identity theft.

CLICK HERE TO GET FOX BUSINESS ON THE GO

Please contact your bank or credit card company

If a hacker obtains your banking or credit card information, they can use it to make purchases or withdrawals without your consent. You should contact your bank or credit card company and let them know the situation. We can help you freeze or cancel your card, dispute fraudulent charges, or issue a new card.

Alert a contact

If a hacker gains access to your email or social media accounts, they could use them to send spam or emails. phishing message to your contacts. They may also pretend to be you and request money or personal information. You should alert your contacts and warn them not to open or reply to messages from you that seem suspicious or unusual.

Read more: Stealthy backdoor MAC malware that can wipe your files

Cart important points

Hackers also look for ways to break into devices. It’s your job to stay secure and safe while browsing the web. This includes being careful about what you download. Even if you receive a file from a trusted contact, you should still use your caution.

CLICK HERE TO GET THE FOX NEWS APP

Are you worried about further attacks from groups like Colddriver? How can you protect yourself? Please let us know by email. Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter.

Ask your cart a question or let us know your story you’d like us to feature.

Answers to CyberGuy frequently asked questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News