Echobot malware is a new version of Mirai!
infosec

Echobot malware is a new version of Mirai!

If there is one thing that seems to have no end to security issues are the authors of malware who ...
Read More
infosec

Mermaids: Personal messages spilled between the organization and parents of transgender children

Mermaids UK is an organization founded by parents of transgender children and aims to support these children ....
Read More
infosec

"Election" hacking has never been simpler than it is today!

Being a professional hacker has never been easier and more profitable than it is today. According to...
Read More
infosec

A new Android Trojan misleads users through notifications

A new Android Trojan discovered by security researchers on the Google Play Store uses false notifications to redirect their ...
Read More
infosec

Europol: Training of police officers with ....... a game!

In recent years, cryptocurrencies are a frequent target of hackers' attacks. For this reason, Europol has decided to train ...
Read More
Latest Posts

Popular media editing site is hacked and distributes Banking Trojan

trojan

The popular VSDC media editing site has fallen victim hackers, who use it to distribute Banking Trojan and steal user information. If you downloaded this program from the end of February to the end of March, then your computer is most likely to get infected.

Today, The Hacker News, published one report of Dr. Web site according to which hackers captured the VSDC website and replaced software downloads to lead to malware versions, putting more than one million site users at risk of being infected by Win32.Bolik.2 banking trojan and KPOT stealer.

The paradox of the case is that although the site is so popular, it works and offers software downloads via an unsecure HTTP connection.

The hackers' motivations behind the attack have not yet been known, but they do not seem to target all users without exception. Dr.Web researchers found a malicious JavaScript code on the VSDC site, designed to test the visitor's geographical location and replace the download links only for visitors from the United Kingdom, the US, Canada and Australia.

What to do if you are infected

Simply installing the regular software update will not remove the malware code from an infected system.

Therefore, if you downloaded the software at this time, you should immediately install antivirus software with the latest updates and scan your system for malware.

In addition, it is recommended that affected users change their passwords for important social media and bank accounts after cleaning the systems or from a different device.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *