{"id":388,"date":"2017-10-13T10:17:21","date_gmt":"2017-10-13T10:17:21","guid":{"rendered":"http:\/\/esolutions.lt\/blog\/?p=388"},"modified":"2018-07-03T12:29:29","modified_gmt":"2018-07-03T12:29:29","slug":"cybercrime-trends-fall-2017-what-cyber-threats-can-you-meet-online","status":"publish","type":"post","link":"https:\/\/esolutions.lt\/blog\/cybercrime-trends-fall-2017-what-cyber-threats-can-you-meet-online\/","title":{"rendered":"Cybercrime trends Fall 2017: what cyber threats can you meet online?"},"content":{"rendered":"<h2 class=\"p1\"><span class=\"s1\">Be aware of ransomware: your files are still in danger<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Recently, Europol announced that ransomware is the most powerful cyber threat among all. Thus, this autumn user should be prepared for data-encrypting virus attacks. One of these threats is a new version of <a href=\"https:\/\/www.2-spyware.com\/remove-locky-virus.html\" target=\"_blank\" rel=\"noopener\">Locky<\/a>; and we are not talking about <a href=\"https:\/\/www.2-spyware.com\/remove-lukitus-ransomware-virus.html\" target=\"_blank\" rel=\"noopener\">Lukitus<\/a> and <a href=\"https:\/\/www.2-spyware.com\/remove-ykcol-ransomware-virus.html\" target=\"_blank\" rel=\"noopener\">Ykcol<\/a> variants. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In October 2017, researchers discovered <a href=\"https:\/\/www.2-spyware.com\/remove-asasin-ransomware-virus.html\" target=\"_blank\" rel=\"noopener\">Asasin<\/a> &#8211; a new example of Locky that spreads via corrupted email attachments. If it finds the way into the computer, there\u2019s no way to get back your files.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The <a href=\"https:\/\/www.2-spyware.com\/remove-btcware-ransomware-virus.html\" target=\"_blank\" rel=\"noopener\">BTCWare<\/a> family also continues to grow up. At the beginning of October, BTCWare <a href=\"https:\/\/www.2-spyware.com\/remove-payday-ransomware-virus.html\" target=\"_blank\" rel=\"noopener\">PayDay ransomware<\/a> version has been noticed spreading and asking to pay the ransom. Thus, it\u2019s time to backup to avoid possible damage.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">Facebook scammers allure victims with free iPhone X<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Virtual life on the biggest social network is not simple and calm. The new wave of <a href=\"https:\/\/www.2-spyware.com\/remove-facebook-virus.html\" target=\"_blank\" rel=\"noopener\">Facebook virus<\/a> spread a scam aiming at Apple fans and those who are in desperate need to get the latest iPhone model for free.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Numerous fake pages were created on Facebook and Instagram to attract users to participate in <a href=\"https:\/\/www.2-spyware.com\/beware-of-free-iphone-scams-on-facebook-and-other-social-media-sites\" target=\"_blank\" rel=\"noopener\">iPhone\u2019s giveaway<\/a>. Undoubtedly, no one is going to give free Apple phones. The purpose of this scam is to collect a bunch of sensitive information about users. In order to participate in such contest, people are asked to verify their Facebook accounts, enter the full name or contact details. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Scam posts might also redirect to suspicious pages and shows numerous ads. Therefore, naive users can end up on a malicious website until he or she ends up on a phishing site. Thus, this autumn you should not forget that too-good-to-be-true offers are always created by criminals.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">Malvertising attacks become bigger and more sophisticated<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">It seems that malvertising became a new sweet spot for cyber criminals. This autumn crooks launched two massive campaigns to spread malware-laden ads. At the beginning of October, the legit Taboola advertising platform was hacked.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Malicious <a href=\"https:\/\/www.2-spyware.com\/remove-taboola-ads.html\" target=\"_blank\" rel=\"noopener\">Taboola ads<\/a> were noticed on msn.com website. They redirected to a tech support scam website that warned about \u201charmful virus\u201d and asked to call a toll-free phone number to Microsoft technicians. Indeed, there\u2019s nothing unique about this scam example.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Later KovCoreG group showed that they are capable of hacking another legit ad-services. This hackers team aimed at one of the most popular and most visited websites &#8211; Pornhub. However, this time criminals used a sophisticated attack which targeted users by their location and used browser.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">People from the US, Canada, the UK and Australia who visited this porn site using Chrome or Firefox were asked to install a critical update. Meanwhile, Microsoft Edge and Internet Explorer users were tricked by fake Adobe Flash Player update. In this way, cyber criminals <a href=\"https:\/\/www.2-spyware.com\/kovter-malware-infected-millions-of-adult-themed-website-users\" target=\"_blank\" rel=\"noopener\">tricked millions of users<\/a> to install <a href=\"https:\/\/www.2-spyware.com\/remove-kovter-c-virus.html\" target=\"_blank\" rel=\"noopener\">Kovter<\/a> click fraud adware. Thus, being careful with ads this fall is more than important.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Be aware of ransomware: your files are still in danger [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/388"}],"collection":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":2,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"predecessor-version":[{"id":391,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/posts\/388\/revisions\/391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media\/389"}],"wp:attachment":[{"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/esolutions.lt\/blog\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}