Don't Be Easy Prey: Here's How Hackers Prey on Victims

Germany and the United States are under attack by the TA886 hacker. Malware is stealing data from these systems countries, as stated by Proofpoint. The operation has been causing losses since October 2022. This virus denotes exclusivity, as it attacks after deeply evaluating its target.

Only when there is an interesting value to attack do criminals spring into action.

see more

Google develops AI tool to help journalists in…

Unopened original 2007 iPhone sells for nearly $200,000; know...

How do hackers track victims?

This malware, for example, relies on emails from phishing that are shared in attachments from Microsoft Publisher. The translation is always in English or German and will depend on where the target is located. They share links and PDFs with malicious content.

After clicking on the link, for example, a process with several steps of downloading “screenshotter” is started, which is one of the tools used by the TA886 malware. Upon entering the user's device, the tool accesses the existing JPGs on the device and sends all data to the hacker.

The captures are part of the verification process to know if the user has a considerable value in the account. If criminals deem it to be good value, the virus will steal all the financial data and personal information it wants, attacking the individual shortly afterwards.

protect yourselves

First of all, have an antivirus installed on the device, both on Android and iOS, on computers and MacBook. Look for the best option offered for your device. The second step is to avoid clicking on links from unknown addresses. If you have received SMS, email or social media messages, the ideal is to disregard any image that may be attractive.

If the suspicious link was forwarded by a social network, block the user and report it as a “fake profile” so that the criminal act does not reach other people. In addition to taking into account amounts, hackers manage to promote products and content on social networks to take money of people.

Lover of movies and series and everything that involves cinema. An active curious on the networks, always connected to information about the web.

Human Skeleton: Bone Names, Functions and Divisions

Human Skeleton: Bone Names, Functions and Divisions

 O human skeleton is a structure formed by several bones and cartilages, which allow, among many ...

read more
Scientific Calculator in Trigonometry

Scientific Calculator in Trigonometry

Scientific calculators have keys designed for trigonometric functions. They calculate the values ...

read more

The craft corporations

Between the eleventh and twelfth centuries, we observe that Medieval Europe underwent intense soc...

read more