Connect with us

Technology

Fake software fixes fuel money-stealing malware threat

Published

on

Fake software fixes fuel money-stealing malware threat

Online protection firm Proofpoint warns that new and sophisticated malware that impersonates Google Chrome and Microsoft has the potential to steal money from Windows device owners. Multiple groups of cybercriminals are using this malware, including some known for sending spam emails that can infect computers with malware or ransomware.

The malware poses as fake updates in internet browsers like Chrome to trick users into downloading harmful code. Once the code is on the computer, the hackers can access cryptocurrencies, sensitive files and personal information.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Microsoft laptops (Microsoft) (Kurt “CyberGuy” Knutsson)

Advertisement

How does the fake update malware work?

Proofpoint identified a larger distribution of the malware this month, but the online protection firm believes the campaign has been ongoing since March 2024. The malware poses as fake Google Chrome, Word and OneDrive errors to coerce users into downloading harmful code. These errors prompt the visitor to click a button to copy a PowerShell “fix” into the clipboard, then paste and run it in a Run dialog or PowerShell prompt.

“Although the attack chain requires significant user interaction to be successful, the social engineering is clever enough to present someone with what looks like a real problem and solution simultaneously, which may prompt a user to take action without considering the risk,” warns Proofpoint.

When the PowerShell script runs, it checks if the device is a valid target. Then, it downloads more payloads. These steps include clearing the DNS cache, removing clipboard content, showing a fake message, and downloading another remote PowerShell script.

ClickFix error message (Proofpoint) (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR PCS, MACS, IPHONES AND ANDROIDS – CYBERGUY PICKS

Advertisement

Cryptocurrency theft

This second script checks if it’s running on a virtual machine before downloading an info stealer. Once everything is ready, the hacker can access the victim’s cryptocurrency. This scheme redirects the victim’s funds to the hacker instead of the intended recipient.

Alternative attack method: Email lure

Proofpoint notes that bad actors also use another method called “email lure” to install harmful software. Emails, typically those that appear to be work- or corporate-related, contain an HTML file that resembles Microsoft Word. These emails prompt users to install the “Word Online” extension to view the document correctly.

Similar to the method above, users are prompted to open PowerShell and copy over malicious code. Proofpoint says the deceptive “campaign” is widespread. “The campaign included over 100,000 messages and targeted thousands of organizations globally,” according to the firm.

HTML attachment containing instructions on how to copy and paste PowerShell that leads to the installation of malware (Proofpoint) (Kurt “CyberGuy” Knutsson)

DON’T LET SNOOPS NEARBY LISTEN TO YOUR VOICEMAIL WITH THIS QUICK TIP

Advertisement

5 ways to protect yourself from harmful software

The fake Chrome and Microsoft Word malware creates a sense of urgency, making users click on the links and unknowingly compromise their devices. There are several steps you can take to protect yourself from such malware.

1) Have strong antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Use a VPN: Consider using a VPN to protect against being tracked and to identify your potential location on websites that you visit. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

3) Monitor your accounts: Regularly review your bank statements, credit card statements and other financial accounts for any unauthorized activity. If you notice any suspicious transactions, report them immediately to your bank or credit card company.

4) Place a fraud alert: Contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.

Advertisement

5) Enable two-factor authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Kurt’s key takeaways

Hackers have cleverly designed malware that prompts you to install it on your devices. This malware specifically targets Windows users, and I’ve noticed that Windows devices seem to be more susceptible to these kinds of attacks. Recently, Microsoft admitted to a Wi-Fi driver flaw in Windows that allows hackers to hijack your PC simply by being on the same Wi-Fi network. It’s crucial to be cautious when browsing online or connecting to public Wi-Fi.

How do you verify the authenticity of software before downloading and installing it on your device? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels

 Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

The FCC’s foreign drone ban is here

Published

on

The FCC’s foreign drone ban is here

The Federal Communications Commission has banned new drones made in foreign countries from being imported into the US unless the Department of Defense or the Department of Homeland Security recommends them. Monday’s action added drones to the FCC’s Covered List, qualifying foreign-made drones and drone parts, like those from DJI, as communications equipment representing “unacceptable risks to the national security of the United States and to the safety and security of U.S. persons.”

DJI is “disappointed” by today’s action, Adam Welsh, DJI’s head of global policy, says in a statement. “While DJI was not singled out, no information has been released regarding what information was used by the Executive Branch in reaching its determination.” Welsh adds that DJI “remains committed to the U.S. market” and noted that existing products can continue operation as usual. Other items on the FCC’s list include Kaspersky anti-virus software (added in 2024) and telecommunications equipment from Huawei and ZTE (added in 2021).

The FCC says it received a National Security Determination on December 21st from an interagency body saying that “uncrewed aircraft systems” (UAS) and critical UAS components produced in a foreign country could “enable persistent surveillance, data exfiltration, and destructive operations over U.S. territory” and that “U.S. cybersecurity and critical‑infrastructure guidance has repeatedly highlighted how foreign‑manufactured UAS can be used to harvest sensitive data, used to enable remote unauthorized access, or disabled at will via software updates.”

If you already own a drone made outside the US, you will still be able to use it, according to the FCC’s fact sheet. Drones or drone components can be removed from the Covered List if the DoD or DHS “makes a specific determination to the FCC” that it does not pose unacceptable risks.

“Unmanned aircraft systems (UAS), also known as drones, offer the potential to enhance public safety as well as cement America’s leadership in global innovation,” FCC chairman Brendan Carr says.

Advertisement
Continue Reading

Technology

Netflix suspension scam targets your inbox

Published

on

Netflix suspension scam targets your inbox

NEWYou can now listen to Fox News articles!

Holiday phishing attempts surge every year, and scammers know people juggle subscriptions, gifts and billing changes. That makes a fake alert feel real for a split second. Stacey P. emailed to tell us that he received one of these messages and wrote:

“I thought I should forward this message to you that I received today that was ostensibly from Netflix. Without clicking on any links, I called Netflix and they advised me that my account is in good standing. They asked me to forward this to them.”

— Stacey P.

Stacey’s experience shows how convincing these emails can appear and why taking a moment to verify can make all the difference. These Netflix suspension emails look polished at first glance. When you look closer, however, the warning signs jump out.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

Holiday phishing scams spike as fake Netflix suspension emails exploit seasonal billing confusion and urgency. (Zeng Hui/Xinhua via Getty Images)

Why scammers use this approach

People expect billing reminders during the holidays. When you see a familiar logo during a busy day, your guard drops for a moment. Scammers build templates that look clean, simple and trustworthy because it increases their odds of success.

Red flags inside the fake Netflix message

The Netflix scam email attempts to mimic Netflix’s branding, but several details reveal it is fraudulent.

Spelling and grammar issues

The email includes mistakes real companies would never send. It uses valldate instead of validateCommunicication instead of communication and even writes “sent to yo” with the u missing from you. Errors like these are major signs of a scam.

Advertisement

Strange tone and pressure tactics

The message claims your billing info failed and says your membership will be suspended within 48 hours unless you act. Criminals rely on urgency because it stops people from thinking clearly.

Fake login buttons

The bold red Restart Membership button aims to lure you into entering your credentials on a phishing page. Once you type your password and payment details, you hand them over to attackers.

Generic greeting

The message uses Dear User instead of your name. Netflix includes your account name in official communications.

Suspicious footer and address

The footer contains off wording about inbox preferences and a Scottsdale address not tied to Netflix. Real subscription providers use consistent company details.

FACEBOOK SETTLEMENT SCAM EMAILS TO AVOID NOW

Advertisement

A reader narrowly avoided a Netflix phishing scam by calling the company instead of clicking the email link. (Luis Boza/NurPhoto via Getty Images)

How to stay safe from the Netflix suspension scam

A few habits can protect your account even when a phishing attempt looks convincing.

1) Check your account on Netflix.com

Open Netflix on your browser or app instead of clicking any link in the email. Your account status there is always accurate.

2) Avoid entering payment details through email links

Phishing pages often copy real sites. Instead of clicking the link in the message, open your browser and type the official website address yourself. This keeps you in control and away from fake pages.

3) Use a data removal service

Scammers often pull email addresses and personal details from data broker sites. These lists fuel subscription scams that look like the Netflix alert Stacey received. A trusted data removal service can pull your information off those sites and cut down on future phishing attempts.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

4) Hover over links to reveal the true URL

On a computer, hovering over a link shows where it really goes. If the address looks strange, delete the message.

5) Report the scam

Forward suspicious Netflix emails to phishing@netflix.com. This helps the fraud team block similar messages.

Advertisement

6) Strengthen your device security

Use two-factor authentication (2FA) for your email and install strong antivirus software to catch malicious pages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

Scammers use polished branding and urgent language to trick users into giving up login and payment details. (Gabby Jones/Bloomberg via Getty Images)

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

7) Consider an identity theft protection service

If you ever enter your billing info into a fake login page, attackers can use that data for much more than streaming fraud. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

Advertisement

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Stacey’s caution prevented him from becoming another victim of this email scam. These messages keep getting more believable, so spotting the red flags and using the steps above can save you time, money and frustration.

Have you seen a fake subscription alert recently that nearly fooled you? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Samsung ‘Wide Fold’ rumored to rival Apple’s foldable next year

Published

on

Samsung ‘Wide Fold’ rumored to rival Apple’s foldable next year

Apple’s long-rumored foldable iPhone is set to arrive next year, and already faces some preemptive competition from Samsung. Korea’s ET News reports that Samsung’s upcoming “Wide Fold” is also set to launch in 2026, and will closely mirror the display size and 4:3 aspect ratio of Apple’s first foldable.

The machine-translated report says the Wide Fold is expected to feature an OLED display that measures 5.4 inches in its folded position, and 7.6 inches when unfolded. “It will be a ‘passport’ type with a 4:3 screen ratio when unfolded,” according to an unnamed industry source cited by ET News.

Last week, The Information reported that Apple’s upcoming foldable will feature a 5.3-inch display that increases to 7.7 inches when open, and will have an aspect ratio “similar to that of Apple’s largest iPads when viewed in landscape mode,” and will be “more wide than tall when unfolded.” Most iPad models sport a near 4:3 aspect ratio. This was the latest rumor that pointed to Apple’s first foldable iPhone having a wide aspect ratio in portrait mode, though Bloomberg’s Mark Gurman said in September that the device would look like two iPhone Airs stuck together.

Both Samsung and Apple’s upcoming foldables are expected to launch in Fall 2026. The 4:3 aspect ratio is better for reading e-books and documents, viewing photographs, or creative tasks like design and image editing, but would result in traditional landscape and portrait videos having ugly black bars at the top and bottom of the screen. This is something that’s already noticeable on Samsung’s squarish Z Fold 7.

Advertisement
Continue Reading

Trending