Cybersecurity NewsNews

HP Raises Alarm Over Hackers Getting Victims Through Ads

Loading

According to HP Wolf Security 2023 Q3 cyber threat assessment from HP’s software firm, cybercriminals utilize cutting edge techniques to analyze and optimize user attacks using advertisement technologies.

Online advertising techniques are deployed in these attacks to boost cybercriminal efforts and get more “clicks.” The study also revealed a 7% increase in the spread of malware by PDF files, including DarkGate, Ursnif and WikiLoader.

Due to the placement of these ads, it is easy to conclude that the targets are unsuspecting internet users. One of the forms of spreading this malware is through PDF files. This can take the form of OneDrive error notices, which can lead to the DarkGate infection. Internet criminals make a full analysis of a fraud type that receives more clicks from users by using these advertising networks.

According to sources, Cybercriminals utilise SMS and websites to spread malware and exchange authentic files. Additionally, it is harder to spot these ads as they are mostly on sites many deem as trustworthy.

The danger this poses cannot be overemphasized as many netizens are at risk. Once the malware infects a user’s system, the threat actor gains complete access to it. The malware then exfiltrates sensitive data to Discord or Textbin.

HP Addresses Growing Concerns

“Internet criminals are increasingly able to penetrate human minds and operate on various tactics,” said senior threat analyst Alex Holland of the HP Wolf Security research team. Popular cloud services constantly evolve their designs. Users tend to adapt to the new designs even when they are yet to understand it, thus causing an indistinguishable difference between the original and counterfeit.

“Cyber criminals optimize their malware operations by exploiting the exact tools that businesses can employ to run campaigns. Thereby increases the likelihood of users falling for bait,” said Dr Ian Pratt, head of personal system security at Hewlett Packard. It will only become increasingly difficult to identify real from fake as Generative AI creates even more convincing destructive content for little to no expense.”

In order to protect and safeguard sensitive data from well-resourced threat actors, organizations need to isolate and restrict behaviour such as opening attachment files, visiting links or downloading browser plugins.

Related Articles

Back to top button