Cybercrime uses coronavirus, the New China Virus, to spread malware with malspam campaigns. Yoroi-ZLab: Me mails contain weaponized attachments. Kaspersky: The files carry various malicious codes such as bank trojans, ransomware and worms
The coronavirus that arrives from China, in addition to being a now global emergency, has also become a bait of cybercrime. Objective: to spread malware through an malspam campaign with “weaponized” attachments. Cyber security researchers have found out, as Security Affairs reports. According to Yoroi-ZLab, these are packaged messages about the New China Virus alarm. Inside there are attachments, which require the enabling of the Macros to be opened. The infection starts here. By the way, Kaspersky points out that attackers use various types of files (pdf, mp4 and docx), all with a “coronavirus” theme. They formally contain information on the pandemic, its spread and how to avoid contagion. In fact, they carry various malicious codes such as banking Trojans, ransomware and worms.
IBM X-Force cyber security experts: Users in Japan are targeted with attacks to spread Emotet
IBM X-Force cyber security experts have discovered a coronavirus-themed malspam campaign that is targeting users in Japan to spread Emotet malware. Here, too, the bait is the pandemic prevention measures and to add strength to the messages is the request to open documents as soon as possible. Moreover, as Antonio Pirozzi, the head of Yoroi-ZLab, confirms that is not a new variant of the malicious code. But of a version already seen recently in the past in the cybercrime campaigns related to corporate invoices. This element suggests that cyber criminals thought they could take advantage of the situation immediately. So, they didn’t have time to update their available tools. It is not excluded, however, that in the next they do not. Consequently, it is essential to pay close attention and avoid opening emails related to the topic.