Nintendo-Power

Daily Gaming news, videos, reviews, tips & guides. Let's share our love of BigN games!

Hackers spread new malware through Word documents, beware of links

As always, be careful about the links you download from your emails. HP Wolf Security researchers have discovered a new malware hidden in Word documents. Once activated, a lot of information on the victim’s computer can be recovered.

There are various ways to get the victim to download the malware. It is very common for the target to hide the malware that executes without realizing it and to hide the processor that appears normal. The fake version of Ccleaner currently in circulation is a perfect example. Hiding in an email attachment is another common method. In this small game, applications from the Office suite are especially popular, as antivirus software can sometimes be powerless.

HP Wolf Security researchers at the Cyber ​​Security Institute have made a new discovery that confirms this rule. In fact, a hitherto unknown malware was found in the email campaign containing the infected Word document. This malware, called SVCRready, can retrieve many confidential information such as the version of the operating system once installed and the applications used. Worse, it is often associated with RedLine Stealer, which is another popular malware that is very bad.

Be careful not to download any word file from your emails

As a result, RedLine Stealer is capable of stealing passwords, bank details, or even the victim’s Internet history. To hack Word documents, hackers cracked the file that modifies the source code of the application, which is a very popular technique among actors who use this propaganda method. Also, the group behind this act is TA551, which has already made a name for itself through its malicious email campaigns.

See also  Intel Core i9-12900K: Alter Lake CPU sold before release

Related: How to convert a Word document to a PDF file

Nevertheless, according to researchers, SVCRready is less dangerous than it appears. “Some components of malware are broken”Patrick Schläpfer explains. “SVCRready is clearly in development, and malicious actors have been adding encryption to network communications for the past few weeks.

Source: Docrador