Cyber security researchers have warned of a new strategy by cyber criminals toying with the popularity of the Netflix sensation Squid game.
According to the security firm Kaspersky, several dozen malicious files with names that refer to the broadcast are currently circulating on the Internet, most of which are designed to be secondary Malware Infections.
These files are distributed in several ways: through unofficial app stores, malicious websites, E-mail Campaigns and more. With Halloween only days away, cyber criminals also run fake Squid Game costume stores that steal and personal information Credit card Details. Given the demand for the iconic mask and jumpsuit-based costume, this is expected to be a particularly successful attack vector in the coming days.
Break the game
It is a common tactic used by cyber criminals to hold on to the latest trend or events in order to trick people into making mistakes. Hackers used the in the same way Start of the latest James Bond film spread Ransomware and stealing personal information, threat actors are now taking advantage of Squid Game’s popularity.
“It was only a matter of time before Squid Game became a new hit bait. As with any other trending topic, cyber criminals have a good idea of what will and will not work, ”explains Anton V. Ivanov, security expert at Kaspersky.
“Needless to say, targets end up losing their data and money, and malware is installed on their devices. Therefore, it is extremely important for users to verify the authenticity of websites when looking for a source to stream the show or purchase merchandise. “
In addition to checking the website URLs and content for abnormalities, it is recommended that users never enter payment details on a website that does not have HTTPS protection (indicated by a lock icon in the address bar).
Meanwhile, for an extra layer of protection, web users should consider a reputable Antivirus Product on all devices and use a safe one Password generator to create unique passwords for online accounts that protect against attacks with passwords in the event of compromise.
This article was previously published on Source link