Tuesday, May 12, 2015

Cyberoszuści impersonate … Polish Post – Banker

ESET experts warn again CryptoLockerem
 - The type of ransomware threat that encrypts files on the
 a user’s computer, and then requests a ransom in bitcoinach. This time
 cyberoszuści lure their victims mails containing information about
 undelivered consignment courier. The alleged sender of the message is to be
 Polish Post. Rough click on the link provided in the email may end
 for the user losing access to all your files.

 
 

News-Trap,
 before which experts warn of ESET, distributed by
 cyber criminals who are impersonating well-known institution – Polish Post -
 They try to lull their victims and to maximize mission success
 operation. The aforementioned message-trap contains information about the non-delivery
 shipment by courier. Infection begins when the victim clicks in
 link in the message. Then the network is downloaded and installed horse
 Trojan, who quickly pulls from the Internet more malware -
 In this case CryptoLocker.


 
 
 

The threat, when run on a victim’s machine,
 network drives and encrypts all files, among others, Those with photos, movies or
 user documents, and then displays a message demanding ransom.
 If the victim wants to restore access to encrypted files, you must pay
 authors threat.

 

To
 protect themselves against these attacks, you should start from prevention. Bartholomew Noose, Team Leader ESET has prepared a few tips that will help
 protect yourself from infection:

 

  1. Create a backup of your files – encrypted files can not be deciphered without
     knowledge of the secret key, so it’s important to take copies of their
     files. For this purpose, you can use it.

  2.  
  3. Software Update – with systematic updates, you can be sure that
     all known vulnerabilities have been patched, which significantly affects the safety.
    Save
     alertness while using the network
    – suspicious party sudden change site content
     Web or a request for additional data when logging in to the site should
     raise your vigilance.
  4.  

  5. Update
     antivirus software to the latest version
    – with a new version of the program, all the risks are
     more effectively detected and blocked. Do not forget to update
     signature database and program components provided by the manufacturer. It is worth
     Also, make sure they are not made to exclude from scanning
     antivirus program configuration, in particular of the email,
     whereby the spreading CryptoLocker. It is also important to
     and scans all files and their expansion was enabled by default.

  6.  
  7. Be careful – Do not open attachments from unknown sources.
     in the case of messages impersonating invoice – verify the number
     What account is given in the message body. Customers always have the individual companies
     own individual account number, and this in different phishing messages
     from him.
  8.  

 

    Source: Press Release

    LikeTweet

No comments:

Post a Comment