Hackers revive ancient malware to hit remote workers

Social Engineering Malware is again growing in popularity – because it still works!

Hackers are using years-old malware for fresh attacks amid the COVID-19 pandemic. The result? A surge of remote access spyware, trojans, botnets, keyloggers, many highly dangerous. They rely on social engineering and phishing campaigns to spread in a shift to remote working.

• NetWiredRC, malware first used in 2014, rose by 200% in Q1 2020.
• LokiBot malware, a keylogger first discovered in 2015, that hides code inside images, rather than pdf and attachments that remote workers have been told to guard against.
• AZORult, from 2016, acts as a downloader for other malware is behind coronavirus-themed emails.
• Other malware, including the DanaBot strain – increased 166% between February and March.
• There was also a 26% rise in the number of card skimming attacks between February and March.

Given Businesses have many employees working from home, the trend of hackers targeting vulnerable endpoints will also remain. This bears the question, have you discussed your security with the IT Experts at Pink Connect? Give the team a call on 0345 450 9393 and we will carry out some initial checks for you. Alternatively, send us an email to tellmemore@pinkconnect.com.