Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 2 of 2
Like Tree1Likes
  • 1 Post By whiteLight

Thread: Seemingly Legit Resume Actually Contains Crypto-Malware

  1. #1
    It's Alright,You Heard?
    whiteLight's Avatar
    Reputation Points
    214616
    Reputation Power
    100
    Join Date
    Aug 2014
    Posts
    9,269
    Time Online
    462 d 3 h 45 m
    Avg. Time Online
    3 h 7 m
    Mentioned
    2378 Post(s)
    Quoted
    807 Post(s)
    Liked
    12475 times
    Feedbacks
    440 (100%)

    Seemingly Legit Resume Actually Contains Crypto-Malware

    The malicious email, targeted at a company’s resume screening department, is equipped with file encryption capabilities.

    A new ransomware having capabilities of file encryption is being flung at the company workers that perform resume screening for job seekers.

    This malware is distributed through a short and precise email message that appears legitimate and informs about the availability of a CV/resume in the attachment. Thus, the recipient is encouraged to open the attachment.

    However, this email contains CryptoWall and it is unclear if the cybercriminals launched a series of similar messages for catching victims or it is a targeted attack.


    For removing suspicion of fraud, the attackers incorporated a brief introduction of the supposed job candidate by providing a believable name and asking for opening the attached file for further information.

    The email reads:

    “HI, MY NAME IS [FIRST AND LAST NAMES REMOVED]. I AM HEREWITH SUBMITTING MY RESUME UNDER ATTACHMENT FOR YOUR PERUSAL. THANK YOU.”
    However, hidden in that attached document is an archive containing a JavaScript coded with commands to download a version of CryptoWall ransomware.


    When the malware is executed on the system, it instantly starts encrypting the files stored on the hard disk and holds the data hostage till the demanded fee is paid in exchange of the decryption key/code.
    Mokoshotar likes this.

  2. #2
    Wanderer Mokoshotar's Avatar
    Reputation Points
    487
    Reputation Power
    38
    Join Date
    May 2015
    Posts
    136
    Time Online
    11 d 9 h 25 m
    Avg. Time Online
    5 m
    Mentioned
    44 Post(s)
    Quoted
    19 Post(s)
    Liked
    57 times
    Feedbacks
    5 (100%)
    This is the reason virtualization systems are in high-demand today. There is no effective way to battle the malware, so the best way is to isolate them.


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •