Connect with us

Hi, what are you looking for?

HEADLINES

Coronavirus has reached the web – Kaspersky

The discovered malicious files were masked under the guise of pdf, mp4, docx files about the coronavirus. The names of files imply that they contain video instructions on how to protect yourself from the virus, updates on the threat and even virus detection procedures, which is not actually the case.

Kaspersky detection technologies have found malicious files disguised as documents related to the newly discovered coronavirus – a virus disease which has been at the top of media headlines due to its dangerous nature.  

The discovered malicious files were masked under the guise of pdf, mp4, docx files about the coronavirus. The names of files imply that they contain video instructions on how to protect yourself from the virus, updates on the threat and even virus detection procedures, which is not actually the case. 

In fact, these files contained a range of threats from Trojans to worms which are capable of destroying, blocking, modifying or copying data, as well as interfering with the operation of computers or computer networks. 

“The coronavirus, which is being widely discussed as a major news story, has already been used as bait by cybercriminals. So far we have seen only 10 unique files, but as this sort of activity often happens with popular media topics then we expect that this tendency may grow. As people continue to be worried for their health, we may see more and more malware hidden inside fake documents about the coronavirus being spread,” comments Anton Ivanov, Kaspersky malware analyst.

Advertisement. Scroll to continue reading.

Kaspersky products detect “coronavirus” related malicious files with the following detection names:

Worm.VBS.Dinihou.
Worm.Python.Agent.c
UDS:DangerousObject.Multi.Generic
Trojan.WinLNK.Agent. gg
Trojan.WinLNK.Agent.ew
HEUR:Trojan.WinLNK.Agent.gen
HEUR:Trojan.PDF.Badur.b

To avoid falling victim to malicious programs pretending to be exclusive content, Kaspersky recommends taking the following steps:

  • Try to avoid suspicious links, promising exclusive content. Refer to official sources for trustworthy and legitimate information.
  • Look at the downloaded file extension. Documents and video files should not have been made either .exe or .lnk formats.
  • Use a reliable security solution, such as Kaspersky Security Cloud, for comprehensive protection from a wide range of threats. 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

This interest in the potential of AI, cloud computing and other advanced digital technologies to support sustainable development varies across regions, with emerging Asian...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

Advertisement