Pages

Don’t be prey to Microsoft edge update. It’s nothing, just a Ransomware attack

Another campaign starts against website visitors, and this time the cybercriminals target the browser Microsoft Edge, which seems to be very often used, as per Malwarebytes.

Malicious parties are always seeking various ways to trap different websites users. This time they come with a new hacking technique named “Ransomware,” which is, in actuality, software that doesn’t allow access to the system until the user does not pay a handsome amount. But how do the users get trapped by these kinds of activities? How is it working? Well, the thing is not so simple as it looks. So, when the users visit a website containing malicious ads, it directs them to a magnetic gate. If users are suitable, then they redirect to a malicious magnitude kit. Ransomware works the same as before, just the change of targeting platform now it’s time for browsers. When users come to the browsers to search for something, fake pages are opened repeatedly in which an update option is shown off, and when the users click on an install button, an extension is installed. The extension becomes the reason to build a program that encrypts all users’ data, and once the encryption is done a ransom note is shown to the visitor.

The hackers use malware techniques to identify whether the user is suitable for this type of hacking, which means the user income must be up to the mark by which the other party takes advantage by demanding a quite handsome amount of Ransom after checking their internet protocol addresses. If any users deny paying, its whole system data gets destroyed. So, beware that whenever an update option is seen on the browser, whether Microsoft Edge or Google Chrome, don’t download it.

According to cyber security researchers, a magnitude exploit kit is identified, which pushes the users to install the malicious software on their mobile or computer systems through manipulation tricks (a psychological trap that exploits the users to give their private info by making security fumbles) . It takes some time also.

Recently, a post came out that cybersecurity orders its security intelligence team to find out how the exploit kit traps the users to install and its loopholes, which helps us to crack it.

The security agencies are doing their work, but users can also tackle this on their own by following steps like not clicking the download button if Google chrome and Microsoft show any updates. Remember, their updates are in automation mode. And always keep your data in extra hardware or keep a backup to restore.


Read next: Hackers Use Legitimate Adobe Emails to Harvest Credentials

No comments: