Friday, August 12, 2022
  • Hype
  • Murai
  • Lipstiq
  • Diva
  • Varnam
  • Moviedash
  • Autofreaks
Lowyat.NET
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Hardware
      • Compu-zone
      • Viewnet
      • Thundermatch
      • Sri Computers
    • Notebooks
      • Compu-zone
    • Smartphones
      • Thundermatch
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables
No Result
View All Result
Lowyat.NET
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Hardware
      • Compu-zone
      • Viewnet
      • Thundermatch
      • Sri Computers
    • Notebooks
      • Compu-zone
    • Smartphones
      • Thundermatch
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables
No Result
View All Result
Lowyat.NET
No Result
View All Result
Home Computing

Researchers Discovers Malware that Uses Facebook and LinkedIn Images to Hijack PC

by Huei Song
November 28, 2016
113
SHARES
Share on FacebookShare on Twitter

Researchers recently discovered that attackers are using a new way to distribute malware through images. Called ImageGate, the attackers will embed malware in images on popular social media applications such as Facebook and LinkedIn, and once a user opens the file, their device will be infected.

According to Check Point researchers, the attackers uploads malicious code by exploiting a flaw in the way these website handle images. It will deliberately force victims to download the image file, and once opened, their system will be hijacked and files are encrypted until you pay up.

https://www.youtube.com/watch?v=sGlrLFo43pY

ADVERTISEMENT

While it is relatively easy to avoid being attacked simply by not opening unknown files, what makes the Locky ransomware scary is that it targets major websites that are usually trusted by everyone – no one would expect something downloaded from Facebook would be malicious.

Fortunately, Facebook is already aware of the problem. A spokesperson from the social media says that it isn’t a case of ransomware, instead, it’s simply really “bad Chrome extensions” that sends messages to others, and they have already blocked it several days ago.

Still, it’s better to be safe than sorry. According to Check Point, if you have clicked on an image and your browser starts downloading a file, do not open it, and do not open any image file with unusual extensions like SVG, JS or HTA.

(Source: Check Point via: Engadget)

Follow us on Instagram, Facebook, Twitter or Telegram for more updates and breaking news. 

Tags: check point researchLockyLocky Ransomware
Back to top
Share45Tweet28SendShare

ADVERTISEMENT

RELATED ARTICLES

Hardware

New Flaws within Qualcomm Snapdragon Expose Millions of Phones To Security Issues

by Chief Chapree
August 8, 2020
News

Another Hospital Falls Victim To Ransomware

by Farhan
March 24, 2016
Load More
No Result
View All Result

TRENDING TODAY

  1. 1
    Apps

    WhatsApp Is Giving You Two Whole Days To Delete Messages

  2. 2
    Fintech

    Maybank Apple Pay Page Is Now Live [UPDATED]

  3. 3
    Fintech

    Apple Pay Finally Arrives In Malaysia: Supports Maybank, AmBank, and Standard Chartered

  4. 4
    Telco

    Maxis And U Mobile Reportedly The Only Holdouts From DNB 5G Network

  5. 5
    Laptops

    2022 Acer Swift 5 Lands In Malaysia With New Design and 12th Gen Intel Core

Consumer Tech News & Reviews Malaysia

NETWORK

  • Hype
  • Murai
  • Lipstiq
  • Diva
  • Varnam
  • Moviedash
  • Autofreaks

ABOUT

  • Advertise
  • Careers
  • Privacy Statement
  • Contact Us
  • Editorial Policy
  • Terms & Conditions

©2022 LOWYAT MEDIA, LLC. ALL RIGHTS RESERVED.

No Result
View All Result
  • News
    • Lifestyle
    • Computing
    • Hardware
    • Internet
    • Rumours & Leaks
    • Software
  • Forums
    • Kopitiam
    • Tradezone
    • Property Talk
    • Finance & Business
    • Fast and Furious
  • Gaming
    • PC Gaming
    • Console
    • Esports
  • Mobile
    • Apps
    • OS
    • Tablets
    • Phones
    • Telco
      • Celcom
      • DiGi
      • Maxis
      • Tune Talk
      • U Mobile
      • Buzzme
  • Pricelists
    • Hardware
      • Compu-zone
      • Viewnet
      • Thundermatch
      • Sri Computers
    • Notebooks
      • Compu-zone
    • Smartphones
      • Thundermatch
  • More
    • Automotive Tech
    • Drone
    • Enterprise
    • Entertainment
    • Fashion
    • E-Hailing
    • Wearables

©2022 LOWYAT MEDIA, LLC. ALL RIGHTS RESERVED.

We use cookies to improve your experience. Learn More.