April 28, 2024

excellentpix

Unlimited Technology

How To Protect Yourself From The Latest Malware Wave

Recent research shows a surge in hackers injecting viruses into trusted pc apps. Here’s how to defend against the latest wave of malware attacks.

Recent research shows a surge in hackers injecting viruses into legitimate PC apps to steal personal information. Users should keep in mind a couple of vital steps to prevent these types of malware from entering their computer systems. Ransomware hacks render those affected exposed and vulnerable to follow-up attacks, which can cost a lot.

Hackers stealing information using shady apps are a lot easier to avoid, as users will be more wary before downloading any unfamiliar software into their computers. However, the same can’t be said when it comes to malware hiding under the guise of legitimate apps and extensions. These types of spyware are the kind that get companies worried, and studies are showing similar cases are rising to alarming levels recently.

SCREENRANT VIDEO OF THE DAY

Related: Is Your Smartphone Hacked? Here’s How To Tell

A specific type of exploit is becoming more prevalent lately, one that involves faux Microsoft Excel files or .xll add-ins. According to HP, cases of ransomware hacks utilizing Microsoft Excel add-in files have increased exponentially, growing to over 500% from the last quarter. One instance involves QakBot malware sending compromised Excel spreadsheets (with a .xlsb file extension) using hijacked email threads. Once these attachments are opened, the virus will reportedly hide behind legitimate Windows processes to avoid detection.

How To Defend From Such Malware Attacks


FBI Hacks Ransomware Group Responsible For Colonial Pipeline Attack

What makes these kinds of ransomware tricky is that they often come in the form of vital emails, which lure users by presenting themselves as official order confirmations, payment requests, or invoices. However, the nefarious files give hackers full remote access to one’s computer once they’re opened. Since the cases involve compromised Excel add-in .xll files, it’s best to disable any unfamiliar add-ins in Excel by clicking on “File,” choosing “Options,” picking the “Add-ins” sub-menu then selecting “Go” beside the “Manage Excel Add-Ins” bar at the bottom, then proceed by unticking any suspicious Add-Ins in the menu.


To protect against suspicious attachments, users should consider checking emails using Office 365 that utilizes Microsoft Defender protection, to ensure received attachments are safely scanned and checked prior to opening them. Given that malware or ransomware attacks prey on weaknesses or unpatched vulnerabilities in the system, it’s best to keep everything up to date, from web browsers and email apps to the operating system itself. Of course, it’s always good practice to not open emails from unfamiliar senders, or if they claim to represent legitimate groups users are expecting to hear from, at least directly contact them through their official sites instead, to verify. While this might not prevent hackers from constantly trying, following these guidelines can at least help in preventing users from ending up as another victim of these dangerous ransomware attacks.


More: FBI Considered Buying Spyware That Could Hack Any Phone In The U.S.

Source: HP

Star Wars Cad Bane Live Action Redesign Fan

Star Wars Fans Fix Cad Bane’s Live-Action Design


About The Author

Source News