https://www.scoop.co.nz/stories/BU2009/S00221/certnz-advises-of-malware-being-spread-via-email-attachments.htm
| ||
CERTNZ Advises Of Malware Being Spread Via Email Attachments |
Everyday Kiwis now being targeted by Malware.
CERTNZ have advised the following:
"Malware being spread via email attachments:
A malware campaign which is being spread through attachments or links in emails is currently affecting New Zealanders. Once someone opens the attachments or links in the email, the malware gains access to their email account and can send emails out to their contact list to keep spreading the malware.
Once a computer has been infected with this malware it can result in significant financial loss, or data loss through ransomware infections."
See full information at:
https://www.cert.govt.nz/individuals/alerts/malware-being-spread-via-email-attachments/
CyberProtect is there to support you and your family when the unthinkable happens. CyberProtect Covers you for:
CYBER FRAUD
RESTORATION COSTS
CYBER EXTORTION
IDENTITY THEFT
Get your Cover at: www.CyberProtect.co.nz
Cyber-attacks come in a few ways:
computer
apps and other elements on your devices.
into providing them with sensitive information like Passwords or Credit card information.
data hostage.
Recovering from these cyber-attacks is very costly and can often take significant time to correct, and cause undue stress. Your system will also need to be investigated in-depth to ensure these attackers are completely removed.
There is currently a lot of advice on what to do in New Zealand and globally to protect oneself. Some of these points are:
Scammers target us in a range of ways, having a very large focus on digital channels that we use constantly.
All of the current market information is clear that cyber-attacks can’t be 100% eliminated, we can only reduce our risk by practising safe cyber practices and by insuring ourselves this will provide us with peace of mind.
Malware is a Malicious Software such as Ransomware that is designed to damage or control your computer. Ransomware is, essentially, the digital version of kidnapping.
Scenario could be where a hacker manages to get a ransomware file onto your computer. Typically, hackers will send you an email with a malicious file attached. This file doesn’t look malicious and will often look completely legitimate, like something you receive every day. When you open the file, the ransomware file is deployed, encrypting and locking specific, highly sensitive files on your computer. When you attempt to open the files, you are confronted with a message stating that your files have been locked, and that you will only receive the encryption key if you pay a specified amount to the hacker, usually through an untraceable Bitcoin payment.
Our service:
Phishing involves hackers posing as legitimate institutions in order to trick people into entering sensitive information. For example, a hacker may email you, posing as your bank system administrator, asking you to reset your password. A link is included in the email that directs you to a page that looks like the bank’s legitimate password reset page, including fields for the username and old password. When you enter your old password, the hacker gets access to what is actually your current password. They can then immediately log into your bank account without any detection.
Our service:
Home Page | Business | Previous Story | Next Story
Copyright (c) Scoop Media