Friday, April 23, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

This phishing email contains a password-protected file. Don’t open it.

March 2, 2020
in Internet Security
These are the 12 most common phishing email subject lines cyber criminals use to fool you
586
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

How to protect yourself from a worldwide password-stealing campaign
Danny Palmer explains that researchers have discovered a mysterious phishing campaign attempting to steal usernames and passwords from government departments across North America, Europe and Asia. Here’s what we know – and how it could be stopped. Read more: https://zd.net/2LQ7S5Q

A phishing campaign is using emails claiming to contain secure documents, plus a legitimate remote access tool in an attempt to  gain access to networks.

You might also like

King Island connectivity upgrade to include 110km radio link across Bass Strait

Malware and ransomware gangs have found this new way to cover their tracks

Best free PC antivirus software in 2021

Uncovered by security analysts at Palo Alto Networks’ Unit 42 research division, the campaign appears to have started in January this year and uses a number of sneaky techniques to compromise chosen victims and gain remote access to systems.

Targets of this hacking campaign receive an email which encourages them to open a phoney password-protected document which claims to have been locked in order to secure personal information supposedly contained within. Many of the emails are themed around refunds, online transactions and other invoices.

Researchers believe the password comes in the phishing email and the use of a document featuring the branding in this case of a real cybersecurity provider is a means of generating additional trust from the victim.

SEE: A winning strategy for cybersecurity (ZDNet special report) | Download the report as a PDF (TechRepublic)    

Unlocking the document will enable macros and execute the commands for the next stages of the attack, which ultimately uses PowerShell to install a remote access tool onto the system, along with mechanisms to ensure it maintains persistence.

The tool installed is NetSupport Manger, a legitimate form of remote access control software often used in IT support or for remote collaboration to gain access to the PC.

This could simply be outright stealing information, or it could be part of a longer-term plan, which could see attackers monitor the ingoing and outgoing emails from a compromised user to find out who they communicate with, then potentially using another phishing attack to compromise additional users from the initial account.

But while the way in which the tool is being used is malicious, this won’t be picked up by anti-virus software because NetSupport Manager is a legitimate product – although it’s likely that the attackers haven’t purchased it via legitimate channels.

It’s still unclear what the overall motivation for the campaign is, or the full extent of it. As this particular campaign requires the use of macros, IT administrators can protect users from falling victim to this attack by disabling macros by default. Users should also be wary of unexpected emails from unknown contacts which claim to be urgent – as this could be the telltale sign of a phishing campaign.

READ MORE ON CYBERSECURITY

 

Credit: Zdnet

Previous Post

Hackers Can Use Ultrasonic Waves to Secretly Control Voice Assistant Devices

Next Post

AI and machine learning help scientists understand human face recognition

Related Posts

King Island connectivity upgrade to include 110km radio link across Bass Strait
Internet Security

King Island connectivity upgrade to include 110km radio link across Bass Strait

April 23, 2021
Malware and ransomware gangs have found this new way to cover their tracks
Internet Security

Malware and ransomware gangs have found this new way to cover their tracks

April 23, 2021
Best free PC antivirus software in 2021
Internet Security

Best free PC antivirus software in 2021

April 23, 2021
ServiceNow launches unified agent platform, aims to meld diagnostics with incident automation
Internet Security

ServiceNow launches unified agent platform, aims to meld diagnostics with incident automation

April 23, 2021
SolarWinds hack analysis reveals 56% boost in command server footprint
Internet Security

SolarWinds hack analysis reveals 56% boost in command server footprint

April 22, 2021
Next Post
AI and machine learning help scientists understand human face recognition

AI and machine learning help scientists understand human face recognition

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Edge Computing, The Cloud, And AI Autonomous Vehicles 
Artificial Intelligence

Edge Computing, The Cloud, And AI Autonomous Vehicles 

April 23, 2021
Data Science and Machine-Learning Platforms Market 2020 | Latest Trends, Demand, Growth, Opportunities & Outlook Till 2027 | Top Key Players: SAS, Alteryx, IBM, RapidM – KSU
Machine Learning

Data Science and Machine-Learning Platforms Market 2020 | Latest Trends, Demand, Growth, Opportunities & Outlook Till 2027 | Top Key Players: SAS, Alteryx, IBM, RapidM – KSU

April 23, 2021
King Island connectivity upgrade to include 110km radio link across Bass Strait
Internet Security

King Island connectivity upgrade to include 110km radio link across Bass Strait

April 23, 2021
IoT in Telecommunications: Challenges, Opportunities, Benefits & The Future
Data Science

IoT in Telecommunications: Challenges, Opportunities, Benefits & The Future

April 23, 2021
Your Doctor’s Assistant is AI 
Artificial Intelligence

Your Doctor’s Assistant is AI 

April 23, 2021
Machine learning model generates realistic seismic waveforms
Machine Learning

Machine learning model generates realistic seismic waveforms

April 23, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Edge Computing, The Cloud, And AI Autonomous Vehicles  April 23, 2021
  • Data Science and Machine-Learning Platforms Market 2020 | Latest Trends, Demand, Growth, Opportunities & Outlook Till 2027 | Top Key Players: SAS, Alteryx, IBM, RapidM – KSU April 23, 2021
  • King Island connectivity upgrade to include 110km radio link across Bass Strait April 23, 2021
  • IoT in Telecommunications: Challenges, Opportunities, Benefits & The Future April 23, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates