Malware attack activity has witnessed an upsurge during the ongoing pandemic. Recently, a new campaign has been found to raise the bar a tad bit higher with resume-based subterfuge.

What is happening?

As per research conducted by Check Point Software, a new Zloader malware campaign where banking trojans are disguised as resumes, was found targeting individuals.

Noteworthy statistics

  • Resume-themed campaigns have doubled in the U.S. in the last two months with 1 in 450 malicious files being a resume-related scam.
  • While there has been an increase in COVID-19-related attacks, the total number of malware attacks has decreased by 30% in March as compared to that in January.
  • The month of May witnessed an average of 158,000 pandemic-related attacks a week, which is 7% less as compared to that in April.
  • Among the 10,704 COVID-19-related domains registered, 2.5% were found to be malicious.

More like this

  • A TrickBot campaign hides an attachment labeled as a family leave request within the standards of the Family and Medical Leave Act.
  • The Icedid malware was propagated through Medical Leave forms. Icedid is a banking trojan that steals financial data of victims.
  • The old Excel spreadsheet macro tech has become one of the favorites among threat actors since data stealers can be disguised as Excel spreadsheets.

Stay safe

Organizations should educate their employees to take follow recommended security practices while browsing the web. While communicating and collaborating with others online, individuals need to stay vigilant and be on the lookout for potential baits laid by cybercriminals to trick and infect them with malware.

Cyware Publisher