A potential victim receives essentially phishing emails that allegedly contain official files in common DOCX and PDF formats: decisions and orders, methodological guidelines, notes and resumes.

The letters will actually contain a document, but when the user opens this attachment, a special UltraVNC client will start downloading to the computer in the background – a legitimate application for remotely connecting to a computer. That is, hackers use fairly legitimate software, not viruses, to break into the target infrastructure.

Cybercriminals try to gain full control over the system, copy files and monitor all user actions.

Source: Ferra

Previous articleHere’s how freezing on the walls of the freezer can damage your refrigerator Home Appliances20:32 | 08 June 2023
Next articleEdward Snowden and modern technology: 2013 is child’s play
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here