It’s not surprising news that scammers send malicious software via emails. What is new though, is that you could get a phishing email from your friends or acquaintances.
Find out the full details and how you can protect yourself with us.
Phishing email targets bank details
This is no surprise – as usual, the current attack is targeting bank data. The criminals try to get your personal information with a phishing email, to clear your bank account or to go on a shopping spree at your expense. They also can sell your personal data on the Darknet. We have reported several times in our blog about different phishing attacks .
Since the phishing email seems to come from your contacts, you must be very cautious. After all, you would never expect to receive an attack from friends or acquaintances – people who you trust.
Phishing email launches “Ursnif”
The question remains, how do the hackers get to the emails of your contacts? I’m sure you’ve heard that hackers took over Facebook accounts and then sent a YouTube link. The dangerous video also seemed to come from friends. That’s why many fell for this trick.
Now the same thing is happening, but by email. This means that your friends’ email addresses may have been hijacked by hackers. The dangerous malware is sent by the criminals but they use th name of your friends, so you naively opens the attachment. But the malware Ursnif is hiding in the attachment.
What does Ursnif do on your computer?
As soon as you open the attachment in the phishing email, Ursnif starts working and begins installing software. It works on versions from Windows Vista onwards, older versions are not affected.
Ursnif exploits access data, for example to online shops. But also the software collects bank data. In addition, Ursnif is very interested in your system information. Cookies, certificates, videos and much more are collected by the malware, writes Eli Shlomo .
How do you protect yourself from Ursnif?
Anyone who recklessly or in good faith opens attachments in emails is at risk, because the criminals are extremely clever. The signature data remains the same, nothing seems suspicious. The scammers engage in ongoing conversations and refer to the attachment or a link. But this is where the danger lies.