Coronavirus malware! Kaspersky detection technologies have found malicious files disguised as documents related to the newly discovered 2019-nCov ARD.
Cyber criminals are taking advantage of public fear generated by the spread 2019nCOV ARD virus, and the fake news that goes with it, to advance their agenda. A likely case of social engineering.
The coronavirus malware are infected files that disguises itself as pdf, mp4, docx files about 2019nCOV ARD, but are actually trojans and worms. The filename implies instructions on how to protect yourself from the virus. If said files are ‘clicked’, it can destroy, block, modify or copy data. It can also interfere with computer and network operations.
Kaspersky disclosed that they have discovered 10 unique files, but they expect it to evolve and grow. When people are worried for their safety, cyber criminals will spread malware hidden inside fake documents about the coronavirus. So far, Kaspersky detected “coronavirus” related malicious files with the following names:
- Worm.VBS.Dinihou.r
- Worm.Python.Agent.c
- UDS:DangerousObject.Multi.Generic
- Trojan.WinLNK.Agent. gg
- Trojan.WinLNK.Agent.ew
- HEUR:Trojan.WinLNK.Agent.gen
- HEUR:Trojan.PDF.Badur.b
To avoid falling victim to coronavirus malware and other malicious programs pretending to be exclusive content, security experts recommend taking the following steps:
- Avoid suspicious links, promising exclusive content. Refer to official sources for trustworthy and legitimate information.
- Look at the downloaded file extension. Documents and video files should not have been made either .exe or .lnk formats.
- Use a reliable security solution, for comprehensive protection from a wide range of threats.
Discover more from ASKSonnie.INFO
Subscribe to get the latest posts sent to your email.