• Latest
  • Trending

Lockbit Ransomware Delivered Through Fake Copyright Claim E-mail

June 27, 2022
Everything Samsung Announced at Galaxy Unpacked: Galaxy Z Flip 4, Fold 4, Watch5, Buds2 Pro (August 2022)

Everything Samsung Announced at Galaxy Unpacked: Galaxy Z Flip 4, Fold 4, Watch5, Buds2 Pro (August 2022)

August 10, 2022

The Hacking of Starlink Terminals Has Begun

August 10, 2022

Splatoon 3 Preview – Everything We Learned About Maps, Modes, and Splatfests From The Nintendo Direct

August 10, 2022
How to Stay Cool Without Air-Conditioning and Prevent Heat Exhaustion (2022)

How to Stay Cool Without Air-Conditioning and Prevent Heat Exhaustion (2022)

August 10, 2022
In Humanity's Collective Unconscious, the Body Is a Bad Dream

In Humanity’s Collective Unconscious, the Body Is a Bad Dream

August 10, 2022

Hackers Use Open Redirect Vulnerabilities to Deliver Phishing Content

August 10, 2022

Kali Linux 2022.3 Released – What’s New !!

August 10, 2022

One of 5G’s Biggest Features Is a Security Minefield

August 9, 2022

Trump FBI Raid: 5 Big Takeaways From the Mar-a-Lago Search

August 9, 2022

Chinese APT Hackers Target Govt & Defense Orgs

August 9, 2022
Gadget News Hub
  • Gear
    • Mobile
    • Computer
    • Car
    • Laptop
  • Business
  • Culture
  • Ideas
  • Science
  • Security
  • Game
Wednesday, August 10, 2022
No Result
View All Result
Gadget News Hub
No Result
View All Result
Gadget News Hub
Home Security

Lockbit Ransomware Delivered Through Fake Copyright Claim E-mail

anchani by anchani
June 27, 2022
in Security
0
Share on FacebookShare on Twitter


Hackers Delivered a Lockbit Ransomware Through Fake Copyright Claim E-mail

One of the interesting tricks used by LockBit affiliates is disguising their malware as copyright claims in order to trick users into infecting their devices with ransomware.

There is a copyright violation notice sent through email to these users, apparently containing information that they are using media files without permission from the creators. 

It is because of such emails that recipients are urged to remove content that they consider infringing on their websites.

Technical Analysis


EHA

Cybersecurity researchers at South Korean security firm, AhnLab identified the emails, but they were unable to determine which files were being unfairly used in the body of the emails. 

The recipient should instead be asked to open and download the attached file in order to view the content deemed infringing. The email attachment sent by the threat actors is a ZIP archive and this ZIP archive is password protected. 

While this ZIP file contains a compressed file that contains a copy of a PDF document which is actually an NSIS installer that is disguised as a PDF document.

This is done for the purpose of evading detection from email security software, which is why there is mandatory wrapping and password protection.

An encrypted file has an extension called .lockbit and has an icon that indicates its encryption status. Furthermore, the folder with the encrypted files has a ransom note named ‘Restore-My-Files.txt’ created inside of it.

Fake Copyright Claims

It is possible for a victim to view what images are being used illegally by simply opening the document intended to be a PDF attached to the email. If they open it, the malware will be loaded and the LockBit 2.0 ransomware will be used to encrypt the device.

In any case, you need not be surprised by LockBit using copyright violations as a tactic for malware distribution. Since it is a common lure that is used nowadays in several malware distribution campaigns.

Publishers of content should seriously consider this issue of copyright claims if they want to avoid legal issues in the future. 

If the notification doesn’t give you any concrete details about the violation or you are required to open attached files in order to view details in the complaint, then it is unlikely that it is a legitimate notice.

Users may run attached files without realizing they have done it, as e-mails distributing malware types like this may contain the name of the actual illustrator, whose work they are viewing. Therefore, users should be very cautious when they are downloading such attachments.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.





Source link

Previous Post

FASTX™ Spiral Charger and USB Cable Protector for iPhone, Lightning, Android, Smartphones, Earphones. Multipurpose Spring Style Silicone Cable Protector Mix Colors (Green & Black)

Next Post

Gadget Gear Vinyl Skin Back Sticker Customised Wine Bottle Doodle (8) Mobile Skin Compatible with Infinix Smart 2 (Only Back Panel Coverage)

anchani

anchani

Next Post

Gadget Gear Vinyl Skin Back Sticker Customised Wine Bottle Doodle (8) Mobile Skin Compatible with Infinix Smart 2 (Only Back Panel Coverage)

12 Best Sunglasses for Every Outdoor Adventure (2022): Le Specs, Sunski, and More

12 Best Sunglasses for Every Outdoor Adventure (2022): Le Specs, Sunski, and More

GADGETS WRAP 2020 Kitchen Quotes French Vinyl Sticker Home Decoration Accessories Wall Sticker for Home Decor Decals

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

About Us

We bring you the future as it happens. From the latest in science and technology to the big stories in business and culture, we've got you covered.

Follow Us

Popular Tag

Business Car Computer Culture Game Gear Ideas Laptop Mobile Phone Science Security

Recent News

Everything Samsung Announced at Galaxy Unpacked: Galaxy Z Flip 4, Fold 4, Watch5, Buds2 Pro (August 2022)

Everything Samsung Announced at Galaxy Unpacked: Galaxy Z Flip 4, Fold 4, Watch5, Buds2 Pro (August 2022)

August 10, 2022

The Hacking of Starlink Terminals Has Begun

August 10, 2022

© 2022 gadgetnewshub - We bring you the future as it happens. From the latest in science and technology to the big stories in business and culture, we've got you covered. gadgetnewshub.

No Result
View All Result
  • Gear
    • Mobile
    • Computer
    • Car
    • Laptop
  • Business
  • Culture
  • Ideas
  • Science
  • Security
  • Game

© 2022 gadgetnewshub - We bring you the future as it happens. From the latest in science and technology to the big stories in business and culture, we've got you covered. gadgetnewshub.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
eskişehir emlak eskişehir beyaz eşya servis etimesgut evden eve nakliyat bolu evden eve nakliyat düzce evden eve nakliyat malatya evden eve nakliyat ankara gülüş tasarımı ankara gülüş tasarımı lokmacı yük taşımacılığı yurtdışı dil okulu bahçe mobilyası bal çerkezköy evden eve nakliyat gülüş estetiği nakliye evden eve nakliyat istanbul şehirler arası nakliyat istanbul moloz atımı istanbul evden eve nakliyat mersin evden eve nakliyat sex shop eskişehir telefon tamiri menemen evden eve nakliyat aliağa nakliyat ankara gülüş tasarımı nakliye firmaları eskişehir temizlik şirketleri replika saat