WhatsApp users lured in by malware

Free messaging app service users are frequently targeted by malicious campaigns, according to research

Criminals distributing malware are targeting WhatsApp users, security researchers have discovered.

The malware is being distributed in emails appearing to be from WhatsApp and these messages are being sent out in bulk, attempting to target as many users as possible, Comodo has revealed.

The most common emails sent to users are being disguised as notifications from the company that a user has missed a call or has received audio recording they haven't listened to. Users are alsp being sent other notifications too, including a video note, so WhatsApp users must be vigilant, the company said.

Advertisement - Article continues below

These emails do not come from a WhatsApp email address, even though they are clearly branded as so, making it easier to identify as fraudulent, Comodo added.

The malware itself appears as an email attachment and encourages the user to download it in order to listen to their message or view the missed calls/messages.

A variant of the Nivdort family of malware, the virus replicates itself into a number of the computer's system folders and installing as an auto-run file in the computer's registry.

"Cyber criminals are becoming more and more like marketers trying to use creative subject lines to have unsuspecting emails be clicked and opened to spread malware," said Fatih Orhan, director of technology for Comodo and the Comodo Antispam Labs.

Advertisement
Advertisement - Article continues below

"As a company, Comodo is working diligently in creating innovative technology solutions that stay a step ahead of the cyber criminals, protect and secure endpoints, and keep enterprises and IT environments safe."

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now
Advertisement

Recommended

Visit/security/vulnerability/355276/businesses-brace-for-second-fujiwhara-effect-of-2020-as-patch-tuesday
vulnerability

Businesses brace for second 'Fujiwhara effect' of 2020 as Patch Tuesday looms

9 Apr 2020
Visit/security/cyber-security/355267/zoom-hires-ex-facebook-cso-to-boost-platform-security
cyber security

Zoom hires ex-Facebook CSO Alex Stamos to boost platform security

8 Apr 2020
Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020

Most Popular

Visit/software/video-conferencing/355257/taiwan-first-country-to-ban-zoom-amid-security-concerns
video conferencing

Taiwan becomes first country to ban Zoom amid security concerns

8 Apr 2020
Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/security/cyber-security/355271/microsoft-gobbles-up-corpcom-domain-to-keep-it-from-hackers
cyber security

Microsoft gobbles up corp.com domain to keep it from hackers

8 Apr 2020