New Ransomware Uses Image Files on Facebook, LinkedIn to Hijack Your Computer - ATZ MOBILES

Breaking

Labels

Monday, 28 November 2016

New Ransomware Uses Image Files on Facebook, LinkedIn to Hijack Your Computer

New Ransomware Uses Image Files on Facebook, LinkedIn to Hijack Your Computer

A newly discovered ransomware can target a computer through malware laced images on Facebook and LinkedIn. Researchers claim to have identified a new attack vector, which they call ImageGate, which embeds malware in image and graphic files. Additionally, the researchers discovered that the attacker's method of executing the malicious code within images was through social media apps such as Facebook and LinkedIn.

"The attackers have built a new capability to embed malicious code into an image file and successfully upload it to the social media website. The attackers exploit a misconfiguration on the social media infrastructure to deliberately force their victims to download the image file. This results in infection of the users' device as soon as the end-user clicks on the downloaded file," explained Roman Ziakin and Dikla Barda, Check Point Research team.

The team also suggests that the new malware works same as the Locky virus, a file-encrypting ransomware, works which made headlines few months back. The Locky ransomware once downloaded on the system can automatically encrypt all the files on the device when users try to open it. Users then gain access to their files only when the ransom is paid.

Check Point recommends some steps to stay protected from malwares like ImageGate and Locky. "If you have clicked on an image and your browser starts downloading a file, do not open it," noted the team.

According to researchers, the attackers are targeting social media sites because they are 'white listed' on browsers and can easily be used on attack users. It adds that attackers are "continually searching for new techniques to use social media as hosts for their malicious activities."

The researchers also recommend users not to open any image file with unusual extension such as SVG, JS, or HTA which may be infected with malware. Check Point claims that it updated Facebook and LinkedIn of the attack vector in September.

No comments:

Post a Comment