Recent research shows a surge in hackers injecting viruses into trusted pc apps. Here’s how to defend against the latest wave of malware attacks.
Recent research shows a surge in hackers injecting viruses into legitimate PC apps to steal personal information. Users should keep in mind a couple of vital steps to prevent these types of malware from entering their computer systems. Ransomware hacks render those affected exposed and vulnerable to follow-up attacks, which can cost a lot.
Hackers stealing information using shady apps are a lot easier to avoid, as users will be more wary before downloading any unfamiliar software into their computers. However, the same can’t be said when it comes to malware hiding under the guise of legitimate apps and extensions. These types of spyware are the kind that get companies worried, and studies are showing similar cases are rising to alarming levels recently.
A specific type of exploit is becoming more prevalent lately, one that involves faux Microsoft Excel files or .xll add-ins. According to HP, cases of ransomware hacks utilizing Microsoft Excel add-in files have increased exponentially, growing to over 500% from the last quarter. One instance involves QakBot malware sending compromised Excel spreadsheets (with a .xlsb file extension) using hijacked email threads. Once these attachments are opened, the virus will reportedly hide behind legitimate Windows processes to avoid detection.
How To Defend From Such Malware Attacks
What makes these kinds of ransomware tricky is that they often come in the form of vital emails, which lure users by presenting themselves as official order confirmations, payment requests, or invoices. However, the nefarious files give hackers full remote access to one’s computer once they’re opened. Since the cases involve compromised Excel add-in .xll files, it’s best to disable any unfamiliar add-ins in Excel by clicking on “File,” choosing “Options,” picking the “Add-ins” sub-menu then selecting “Go” beside the “Manage Excel Add-Ins” bar at the bottom, then proceed by unticking any suspicious Add-Ins in the menu.
To protect against suspicious attachments, users should consider checking emails using Office 365 that utilizes Microsoft Defender protection, to ensure received attachments are safely scanned and checked prior to opening them. Given that malware or ransomware attacks prey on weaknesses or unpatched vulnerabilities in the system, it’s best to keep everything up to date, from web browsers and email apps to the operating system itself. Of course, it’s always good practice to not open emails from unfamiliar senders, or if they claim to represent legitimate groups users are expecting to hear from, at least directly contact them through their official sites instead, to verify. While this might not prevent hackers from constantly trying, following these guidelines can at least help in preventing users from ending up as another victim of these dangerous ransomware attacks.
Source: HP
About The Author
More Stories
Best USB charging hub 2022
Moment Curved Surface Mount and Hard Shell Mount for AirTags review
EcoFlow Wave portable air conditioner: The coolest of the cool