WhatsApp users lured in by malware

Free messaging app service users are frequently targeted by malicious campaigns, according to research

Criminals distributing malware are targeting WhatsApp users, security researchers have discovered.

The malware is being distributed in emails appearing to be from WhatsApp and these messages are being sent out in bulk, attempting to target as many users as possible, Comodo has revealed.

The most common emails sent to users are being disguised as notifications from the company that a user has missed a call or has received audio recording they haven't listened to. Users are alsp being sent other notifications too, including a video note, so WhatsApp users must be vigilant, the company said.

These emails do not come from a WhatsApp email address, even though they are clearly branded as so, making it easier to identify as fraudulent, Comodo added.

The malware itself appears as an email attachment and encourages the user to download it in order to listen to their message or view the missed calls/messages.

A variant of the Nivdort family of malware, the virus replicates itself into a number of the computer's system folders and installing as an auto-run file in the computer's registry.

"Cyber criminals are becoming more and more like marketers trying to use creative subject lines to have unsuspecting emails be clicked and opened to spread malware," said Fatih Orhan, director of technology for Comodo and the Comodo Antispam Labs.

"As a company, Comodo is working diligently in creating innovative technology solutions that stay a step ahead of the cyber criminals, protect and secure endpoints, and keep enterprises and IT environments safe."

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

3 Mar 2021
Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021