Leave a comment

This dangerous malware downloader looks so innocent!

This dangerous malware downloader looks so innocent!
photo courtesy of SHUTTERSTOCK

Although cybersecurity experts have made progress when it comes to certain types of ransomware, the overall threat is still a major problem.

The news today serves as proof. Researchers at FireEye have just identified a new Locky ransomware campaign that's using JavaScript to infect its victims. The malicious downloaders are being sent as .zip and .rar files, and are camouflaged as legitimate documents, such as tax information, corporate files and even invoices.

Because this new ransomware is written with more precise coding, it allows hackers to inject the malicious code into these files multiple times. Plus, this method of "hiding in plain sight" allows the malicious code to sneak past some anti-spam filters.

Previously, these types of downloaders were not very efficient, since they were caught by the spam filters. However, by using JavaScript the malicious script is much harder to detect than it once was.

The scariest part of this is that researchers are now speculating this could branch into a new "pay-per-install" type of malware.

Next Story
Source: SC Magazine
Top Story: 12 million duped into downloading malware that steals your information
Previous Happening Now

Top Story: 12 million duped into downloading malware that steals your information

This weekend: 3 streaming TV shows and movies I picked for you
Next Happening Now

This weekend: 3 streaming TV shows and movies I picked for you

View Comments ()