Cryptotrojan – it can affect anyone. The process is always the same: After a fatal click on an email attachment or download link, suddenly nothing works anymore - encryption Trojans block access to all files in a very short time.

The police warn about encryption Trojans.
Daniel Dittel, clerk in the cybercrime team at the Wilhelmshaven/Friesland police station, emphasizes that emails with malicious attachments are still being sent. “These emails are primarily sent to companies,” explains Dittel, adding that when the attachments are executed or attempted to be opened, malware is released that encrypts the affected computer system. “In some cases, the encryption even spread to other computers or data backups in the network!” The perpetrators often leave a message on the now encrypted systems explaining how you can have your data decrypted again by making the required payment.

“There is no guarantee that the system will actually be cleaned up after a payment and that you can then access your data again,” says Dittel.


imageIf in doubt, you support the criminal activities of the perpetrators without regaining control of your data!
“In the end, the PC user has double the costs because they still have to take the system to an IT specialist afterwards!” False application emails to companies are also a popular medium. The perpetrators specifically respond to job advertisements that companies have already posted. The text in the cover letter is usually written in sensible language. The pictures sent by young women and men show a decent appearance and are also intended to increase trust in the alleged authenticity of the email! Classic application fakes look like this:

Dear Sir or Madam,
enclosed you will find my application for the position advertised in the job exchange at the employment agency.
Please see my detailed and attached application documents to find out why I can fill the position optimally and why I can offer your company numerous advantages through my experience. I would be happy if I could introduce myself to you again in person.
Kind regards,
Janine Loerr

Anyone who opens the attached ZIP file will find malicious documents posing as application documents.
These are used, for example, to inject encryption Trojans that render documents unusable, or the computer is inserted unnoticed into a bot network. In addition to the files, you will also find a nice smile in the form of an application photo, which is intended to suggest a certain authenticity. However, if you then open one of the data in the attachment, you will not have access to the "application documents", but will instead start the encryption process Power.

“There is actually no effective protection against these emails because not every antivirus software recognizes the encryption Trojans as such,” explains the investigator.

The police advise: remain skeptical!
The most effective countermeasure remains a critical assessment of the received email by the HR administrator. If necessary, try to contact the applicant by email or telephone, because in most cases the preparation of the perpetrators is not enough. And we say: “ Think first – then click!”

via press release police

Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )