Be careful! A dangerous Windows 10 scam is being circulated and this new type of malware attack is on the loose, taking advantage of the recent Windows 10 release to spread its reach far and wide. According to a blog post by Cisco security researcher Nick Biasini, the attacker are using Microsoft’s latest version of Windows as a way of getting people to install the malware, whech then goes off and wreaks havoc.
Windows 10 upgrade is on and I on my Windows 7 SP1 running computer, genuinely installed the Professional version of the operating system and that too running smooth than ever with all the personal apps, and files placed securecly in the file explorer and what to say about Windows 10, there are plethora of features and improved web browser, alongside Cortana etc makes my PC the best till date.
Apart that, now we’ll be talking about the Windows 10 upgrade scam, where hackers impersoning Microsoft have begun sending out emails informing individuals that they are eligible to upgrade to Windows 10. For users, those who did not get Windows 10 app, should be careful. Carrying the notorious CTB-Locker payload that has been doing the rounds all year, this particular ramsomware takes advantage of the fact that people need to join a virtual line in order to get their Windows 10 download, something that has led to some people trying to find a way to get around Microsoft’s current system.
This has however left open for some people to malware attacks, with one in particular being delivered via spam email that calims to be from Microsoft, offering a quick way of getting the latest iteration of the software maker’s desktop OS without having to join the aforementioned line. Once the user downloads and runs the attacked executable though, they receive a message saying that their data has been encrypted, with no way of getting the data back until ransom is paid.
Ransom, accoding to Biasini, is often to be paid in Bitcoin – which is harder for the authorities to trace. Add in the fact the Tor network is used to anonymously communicate with a service that handles the trasaction and things look grim for thoe infected. If they do pay up, though, the files are unlocked. If they don’t? Those same files are left permanently encrypted, meaning anything from important work documents to family photos could be gone forever.
How to get rid of this Windows 10 email scam? Right now, the best way to protect yourself agianst this or similar attacks is to simply delete any such mails. Worth noting that running any executable file that comes in an email is always a bad idea, even if the sender does claim to be Microsoft.
Here’s what actually it looks like:
The threat of ransomware will continue to grow until adversaries find a more effective method of monetizing the machines they compromise,” says the Talos Group. “As a defense, users are encouraged to backup their data in accordance with best practices. These backups should be stored offline to prevent them from being targeted by attackers.
Stay safe out there people, and be careful what you go double-clicking.
You may also like to check out: