Categories: Ad Guardian PlusNews

Climate-change activist, the lure in a malware campaign

Greta Thunberg, the climate-change activist, became the lure in a massive global malware campaign.

Cybercriminals took advantage of the celebrity status of Greta Thunberg. Proofpoint Threat Insight unveiled that a global malicious email campaign delivering the Emotet malware is using the Swedish environmental activist as a lure.

The email includes the Time nomination of the climate-change activist and the Christmas holidays. This contains an attached Word document – “Support Greta Thunberg.doc”. Once the victims open the recipient, the Emotet malware is installed.

The researchers discovered emails sent in English aimed to the .com and .edu domains. Also, they mentioned that the attackers also aim country-specific domains. So, the named Australia, Canada. E.U., Japan, Singapore, Switzwerland, United Arab Emirates and the UK. Still, they noticed that there are more .edu domains attacked than those associated with any specific country.

These attacks are not only global in their targeting but also in their use of native-language lures. Our researchers have seen malicious emails with subject lines in Spanish, Italian, French and Polish,” they said.

Attackers choose their lures carefully: in many ways their lures are a reliable barometer of public interest and awareness,” Proofpoint researchers pointed out. The fact that they do it during the holiday season is not a random choice. It is the time of the year when people pay less attention to the security. Also, they are more likely to involve in charitable acts and in supporting activists, trying to be better for Christmas.

Emotet evolves permanently

Emotet was at the beginning, back in 2014, a banking trojan. But, since then it has been evolved and it is now a full-service threat-delivery mechanism. After a period of absence, during the summer, it reappeared in the third quarter. In fact, Proofpoint found that Emotet accounted for nearly 12 percent of all malicious email in the period.

Laurentiu Titei

View Comments

Recent Posts

Best SQL Server Management Tool

If you are looking for server-based tools for database management using SQL, you can take…

11 hours ago

Best Open-Source Vulnerability Scanners & Tools

If you want to ascertain the most vulnerable files, areas, and sectors in your data,…

6 days ago

How to Remove Annoying Ads in Chrome

If you are also bothered by the ever-appearing and non-disappearing ads on the Google Chrome…

1 week ago

Best Data Recovery Software for Windows

If you have lost some precious data on your Windows PC due to any reason,…

2 weeks ago

How to Fix High Memory Usage in Windows 11

This article explains the quickest and easiest fixes for Windows 11 high RAM memory usage. …

2 weeks ago

Best Debugging Tools to Use in 2024

You can read this article to learn more about the best tools for debugging to…

3 weeks ago