1. IT-Security >
  2. Locky Ransomware Uses Decoy Image Files To Ambush Facebook, LinkedIn Accounts

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Locky Ransomware Uses Decoy Image Files To Ambush Facebook, LinkedIn Accounts

IT Security vom 26.11.2016 um 00:45 Uhr | Quelle tech.slashdot.org
An anonymous reader quotes a report from Ars Technica: A low-tech but cunning malware program is worrying security researchers after it started spreading rapidly in the past week through a new attack vector: by forcibly exploiting vulnerabilities in Facebook and LinkedIn. According to the Israeli security firm Check Point, security flaws in the two social networks allow a maliciously coded image file to download itself to a user's computer. Users who notice the download, and who then access the file, cause malicious code to install "Locky" ransomware onto their computers. Locky has been around since early this year, and works by encrypting victims' files and demands a payment of around half a bitcoin for the key. Previously, it had relied on a malicious macro in Word documents and spam e-mails, but Check Point says that in the past week there has been a "massive spread of the Locky ransomware via social media, particularly in its Facebook-based campaign." Users are advised not to open any file that has automatically downloaded, especially any image file with an unusual extension such as SVG, JS, or HTA -- though benign-looking images could exploit the way Windows hides file extensions by default.

Read more of this story at Slashdot.

...

Jetzt externen Artikel / Webseite öffnen

1-Klick Newsbewertung

Social Media
"

Kommentiere zu Locky Ransomware Uses Decoy Image Files To Ambush Facebook, LinkedIn Accounts