fbpx
perm_phone_msgConsider your business risks? Chat With US

Christmas malware spreading fast: Protect yourself now | Tom’s Guide

Ransomware BCyber todayJanuary 19, 2020 57

Background
share close

It’s time for ugly Christmas sweaters — and for ugly Christmas-themed malicious spam emails. 

A new malspam campaign dumps an email in your inbox marked “Christmas Party,” “Christmas Party next week,” “Party menu,” “Holiday schedule” or something similar. But the attached Word document delivers a lump of coal: the notorious Emotet Trojan malware. 

“HAPPY HOLIDAYS,” begins the email, as spotted by Microsoft and Cofense Labs. “I have attached the menu for the Christmas Party next week. If you would like bring something, look at the list and let me know. 

“Don’t forget to get your donations in for the money tree,” the email adds. “Also, wear your tackiest/ugliest Christmas sweater to the party.” Sometimes it adds, “Details in the attachment.”

How the Christmas attack works

Because Emotet spreads from one Windows machine to another by raiding infected people’s email contact lists, the malicious email may greet you by name and come from someone you know. So you’ll be tempted to open the attached document. 

If you’re running Word, the program will open the document in Protected Mode. But the people behind Emotet need you to turn off Protected Mode and enable macros. 

So what you may see in the now-visible document will be a stolen Microsoft Office logo and the words, “This document was created in OpenOffice. To edit this document, click Enable Editing from the yellow bar above. Once you have enabled editing, please click Enable Content button from the yellow bar above.”

Once you click those buttons, though, you enable macros, the Office scripting functions that permit Emotet to infect your machine. And once Emotet is installed, it can do practically anything: download more malware, steal confidential information such as passwords or account numbers, get access to your online bank account or set up your computer as a cog in a botnet. 

One thing the malware will definitely try to do is rifle through your contacts list and send everyone on it more Emotet-laden malicious spam emails.

How to avoid Emotet infection

To make sure your holidays don’t end up as ugly as your co-workers’ sweaters, follow a few simple steps:

Make sure macros are turned off in Word. In Word for Windows, go to File > Options > Trust Center > Trust Center Settings > Macro Settings, and choose “Disable all macros with notification”. 

In macOS, it’s Word > Preferences > Personal Settings > Security & Privacy > Macro Security and choose “Warn before opening a file that contains macros.” Emotet doesn’t infect Macs, but other forms of malware that do may be attached to these emails.

Don’t enable editing or content on Word documents that come attached to emails. You’ll be able to read them just fine.

. There are two kinds of Windows user accounts: administrator accounts with the power to install or update software, and limited accounts without that power. If you use a limited account for day-to-day activities, your chances of malware infection drop dramatically.

Use one of the software programs. A good antivirus program will catch and stop an Emotet infection.

This content was originally published here.

Written by: BCyber

Rate it
Previous post

Similar posts

Ransomware BCyber / October 19, 2020

Ad-light, Malware-heavy # Chris Dzombak

Ad-light, Malware-heavy Since December 17, Forbes has been running an experiment wherein some fraction of visitors who are running ad blockers are blocked from accessing Forbes articles until they disable their ad blocker. In exchange, Forbes promises an “ad-light experience”: A Forbes article published yesterday claims that this interstitial resulted in 42.4% of visitors turning ...

Read more trending_flat