Microsoft

Windows users, beware: This fake update could lock up your PC, or worse

Ad


Graphic by Pixabay/Illustration by CNET

With the end of support for Windows 7 coming in January, many users are looking to update to Windows 10 to continue getting security updates and support from Microsoft. According to a Tuesday report from security firm Trustwave, attackers are well aware of this and are targeting Microsoft users with fake Windows update emails that will infect computers with ransomware — an especially sinister type of malware that locks up valuable data on your computer, and demands that you pay a ransom to release it or your data will be destroyed. 

Read also: Upgrade to Windows 10 free, here’s how

The spammers are sending some Windows users emails with subject lines “Install Latest Microsoft Windows Update now!” or “Critical Microsoft Windows Update!” The emails, which claim to be from Microsoft, include one sentence in the message body, which starts with two capital letters, Trustwave found. They ask recipients to click an attachment to download the “latest critical update.” 

screen-shot-2019-11-19-at-8-28-36-am.png

Trustwave

The attachment has a .jpg file extension, but is actually a malicious .NET downloader, which will deliver malware to your machine. The ransomware, called bitcoingenerator.exe, encrypts the recipient’s files, and leaves a ransom note titled “Cyborg_DECRYPT.txt” on their desktop, asking for $500 in bitcoin to unlock the files. 

screen-shot-2019-11-19-at-8-55-30-am.png

Trustwave

The ransomware came from a Github account, which was active during Trustwave’s investigation but has since been removed, the firm noted. Still, this form of ransomware can be created and spread by anyone who gets hold of the builder, attaching it to different types of emails to get through spam filters. 

Most ransomware attacks come in through email, so users should be wary of opening any email attachment or link from an unknown sender, even if it seems to be from a reputable company (hackers impersonate Microsoft more than any other brand when sending spam emails, a May report from Vade Secure found). Misspelled words or poor formatting are often clues of an attack. 

“This is a very common type of phishing attack — where the attacker tries to convince the target to open a malicious attachment,” Karl Sigler, threat intelligence manager of Trustwave SpiderLabs, said in an email. “Windows users should understand that Microsoft will never send patches via email, but rather use their internal update utility embedded in every current Windows operating system. Users should always be wary of any unsolicited emails, especially those that present urgency to open attachments or click on links.” 

For more, check out 4 ways to avoid the next Petya or WannaCry attack





https://www.cnet.com/


Now playing:
Watch this:

Ransomware: How to defend yourself against it





1:36

Source link

Ad
Tags

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Close
Close