Former Ubiquiti dev charged for trying to extort his employer
New malware hides as legit nginx process on e-commerce servers
Nine WiFi routers used by millions were vulnerable to 226 flaws
Emotet now spreads via fake Adobe Windows App Installer packages
Microsoft Edge now bashes Google Chrome when you download it
Phishing actors start exploiting the Omicron COVID-19 variant
Twitter removes 3,400 accounts used in govt propaganda campaigns
Hackers use in-house Zoho ServiceDesk exploit to drop webshells
Qualys BrowserCheck
STOPDecrypter
AuroraDecrypter
FilesLockerDecrypter
AdwCleaner
ComboFix
RKill
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Toksearches.xyz Search Redirect
Remove the Smashapps.net Search Redirect
Remove the Smashappsearch.com Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
eLearning
IT Certification Courses
Gear + Gadgets
Security
COVID
Phishing actors have quickly started to exploit the emergence of the Omicron COVID-19 variant and now use it as a lure in their malicious email campaigns.
Threat actors are quick to adjust to the latest trends and hot topics, and increasing people’s fears is an excellent way to cause people to rush to open an email without first thinking it through.
In this case, the Omicron variant is an emerging strain of COVID-19 that has scientists concerned over its high transmissibility and the potential ineffectiveness of existing vaccines against its mutations.
This all makes it an ideal topic for phishing, as even the vaccinated are worried about how Omicron would affect them in the case of an infection.
UK’s consumer protection organization ‘Which?’ published two samples of new phishing emails pretending to be from the United Kingdom’s National Health Service (NHS) warning about the new Omicron variant.
These emails offer recipients a free Omicron PCR test that will allegedly help them get around restrictions.
To add trust in the emails, the malicious address used for distributing these emails is ‘contact-nhs@nhscontact.com’.
If the recipient clicks on the embedded “Get it now” button or taps on the URL in the email body, they are taken to a fake NHS website claiming to offer the “COVID-19 Omicron PCR test.”
The victims are then directed to enter their full name, date of birth, home address, mobile phone number, and email address.
Finally, they are requested to make a payment of £1.24 ($1.65), which is supposed to cover the delivery cost of the test results.
The purpose of this is not to steal the amount itself but the payment details of the victim, like the e-banking credentials or their credit card details.
During that step, the victim is also requested to enter their mother’s name, which the actors could use to bypass security questions during a subsequent account takeover attempt.
If you think you might have entered your details on a fraudulent site, contact your bank immediately and cancel your compromised card/accounts.
Monitor your bank accounts closely and review the transactions for any signs of unauthorized payments.
If you receive an email that looks suspicious, report it at “report@phishing.gov.uk”. To report smishing texts, forward them to 7726.
Emotet now spreads via fake Adobe Windows App Installer packages
State-backed hackers increasingly use RTF injection for phishing
Stealthy WIRTE hackers target governments in the Middle East
Telegram channel admins who sold fake vaccine cards arrested
APT37 targets journalists with Chinotto multi-platform malware
Not a member yet? Register Now
Former Ubiquiti dev charged for trying to extort his employer
Microsoft Exchange servers hacked to deploy BlackByte ransomware
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.

source