Coronavirus malware! Kaspersky detection technologies have found malicious files disguised as documents related to the newly discovered 2019-nCov ARD.
Cyber criminals are taking advantage of public fear generated by the spread 2019nCOV ARD virus, and the fake news that goes with it, to advance their agenda. A likely case of social engineering.
The coronavirus malware are infected files that disguises itself as pdf, mp4, docx files about 2019nCOV ARD, but are actually trojans and worms. The filename implies instructions on how to protect yourself from the virus. If said files are ‘clicked’, it can destroy, block, modify or copy data. It can also interfere with computer and network operations.
Kaspersky disclosed that they have discovered 10 unique files, but they expect it to evolve and grow. When people are worried for their safety, cyber criminals will spread malware hidden inside fake documents about the coronavirus. So far, Kaspersky detected “coronavirus” related malicious files with the following names:
- Trojan.WinLNK.Agent. gg
To avoid falling victim to coronavirus malware and other malicious programs pretending to be exclusive content, security experts recommend taking the following steps:
- Avoid suspicious links, promising exclusive content. Refer to official sources for trustworthy and legitimate information.
- Look at the downloaded file extension. Documents and video files should not have been made either .exe or .lnk formats.
- Use a reliable security solution, for comprehensive protection from a wide range of threats.
Founder of LODI Inc. (Learning and Organization Development Institute, Inc.) and Co-Founder of Blogwatch. Mentor and Dad of 2 Gen Z Professionals.
Advocate of #HRinHR (Human Rights in Human Resources) and #DigitalCitizenship
Strategist for Talent, Culture & Content Development, and Cyber Wellness Initiatives
Keynoter and Facilitator of Workplace and Life Learning
Blogging since 2004.