New Style of Trojan Phishing Attempts

New Phishing Attempts

Several new Trojan phishing attempts are making the rounds using some old and some new ideas.  Phishing attempts typically attempt to trick a victim into entering their credentials into a fictitious website that mirrors a real one in an attempt to gain personal data or access to accounts.  The new phishing attempts take a brand new approach to tricking potential victims.  Arriving as a PDF, one will upon opening give an error message that when clicked brings the victim to a false login page. This page will harvest a victim’s credentials.  This strategy means that the phishing attempt doesn’t actually contain any malware for the victims security to detect, but relies purely on social engineering to accomplish the heist.

 Another phishing attempt takes an entirely new approach using two separate phases.  In the first phase the user must get exposed to a malware that will attempt to alter search engine results by making malicious links more likely to appear higher in the results.  To the victim, this will make the link appear more credible as it looks like a legitimate search result.  The link will ultimately attempt to have the user download a document containing malicious files.

Spam and Malware filter, like those offered by Protocol 46, can be the best defense against these threats.  Protocol 46 Spam and Malware filters can stop these threats from ever reaching you in the first place.  Should you ever come across something like these threats, remember to be vigilant.  Trusted websites are the only place you should ever enter data and download files.  Do not provide information to website if it doesn’t seem like something relevant they would need.  This new malware highlights the continued and ever more sophisticated attempts of cyber criminals to steal data.

Post by Remote Process