A group of researchers from the company cyber security Cluster25 has discovered a new way of cyber attack that involves the use of a malicious software via fake program files microsoft powerpoint and that it is intended to carry out attacks on organizations and companies.
This modality is not only limited to the opening of a document in order to initiate device infection and infiltration into their systems, but is designed to be activated only when the user of the device activate the presentation mode of the document PowerPoint (PPT) and move the cursor in the workspace.
Once activated, the malware runs a script that downloads a Trojan virus. This virus known as ‘dropping’ performs a new download in drops to avoid being detected and installs a ‘payload’a code in charge of executing malicious tasks.
Thus, cybercriminals could start extracting sensitive information corresponding to clients or workers to block or delete the data as a way of ransomware (data hijacking).
This type of attack has already been registered in some companies and the PowerPoint documents that were used as hooks by the cybercriminals to carry out these cybersecurity breaches had information linked to the Organization for Economic Cooperation and Development (OECD).
How to avoid being a victim of cybercriminals
Cybercriminals can access the systems of devices of people if they have reckless behavior when browsing the Internet, so the first step to avoid being one more victim of these criminals is to browse safely and with an attitude based on prevention.
One of the main recommendations is to browse safe websites. browsers like Google Chrome have integrated some methods that allow knowing if a page complies with protocols of data securityalthough it is also correct for users to verify that the link they entered or the site address does not have misspellings that could suggest a site impersonation.
Another safety tip is to not click on a link that has been sent by means of a suspicious email that attempts to offer economic benefits in exchange for nothing, report on vehicle infractions, prizes of contests in which one did not participate, among other forms of phishing.
Likewise, even when it comes to contacts acquaintances, do not click on any link before asking why it was sent, whether it was shared on purpose, and what kind of website they redirected to. Many scams involve sharing a link to increase the infection field of malware or increased traffic to a website only of advertising.
Finally, the passwords of the accounts of social networks and other services must meet high standards of security: have more than 12 digits if possible, use uppercase, lowercase, numbers and special characters (!”#$%&/=+-). If the user wishes, he can use a service of password manager to make it much easier to manage them or create new ones.