







{"id":17480,"date":"2024-09-10T04:24:25","date_gmt":"2024-09-10T04:24:25","guid":{"rendered":"https:\/\/cissar.com\/?p=17480"},"modified":"2024-09-10T04:24:25","modified_gmt":"2024-09-10T04:24:25","slug":"new-harry-potter-named-malware-strikes-revealing-global-espionage-campaign","status":"publish","type":"post","link":"https:\/\/cissar.com\/index.php\/2024\/09\/10\/new-harry-potter-named-malware-strikes-revealing-global-espionage-campaign\/","title":{"rendered":"New Harry Potter-named malware strikes, revealing global espionage campaign"},"content":{"rendered":"<div class=\"article-body\">\n<div class=\"featured featured-video video-ct\" data-v-543741ec=\"\">\n<div class=\"contain\" data-v-543741ec=\"\">\n<div class=\"control\" data-v-543741ec=\"\"><a href=\"#\" class=\"top\" data-v-543741ec=\"\"><\/a> <a href=\"#\" class=\"close\" data-v-543741ec=\"\">close<\/a><\/div>\n<div class=\"video-container\" data-v-543741ec=\"\">\n<div data-video-tags=\"web_exclusives,primary_tech,3play_processed\" data-video-title=\"'CyberGuy': How to avoid becoming a moving scam victim\" data-video-id=\"6361003200112\" data-video-domain=\"foxnews\" data-video-type=\"CLIP\" data-widget-type=\"embed\" class=\"m video-player\" data-v-543741ec=\"\"><a href=\"https:\/\/www.foxnews.com\/video\/6361003200112\" data-v-543741ec=\"\"><picture data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/288\/162\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/576\/324\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(max-width: 767px)\" data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/672\/378\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/1344\/756\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 768px) and (max-width: 1023px)\" data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/676\/380\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/1352\/760\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 1024px) and (max-width: 1279px)\" data-v-543741ec=\"\"><source srcset=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/896\/500\/image.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/1792\/1000\/image.jpg?ve=1&#038;tl=1 2x\" media=\"(min-width: 1280px)\" data-v-543741ec=\"\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/cf-images.us-east-1.prod.boltdns.net\/v1\/static\/694940094001\/64401b9b-cb21-4dd5-9575-52b280d52956\/308d3db7-738c-4634-8337-71a6fb1f1031\/1280x720\/match\/896\/500\/image.jpg?ve=1&#038;tl=1\" alt=\"'CyberGuy': How to avoid becoming a moving scam victim\" width=\"896\" height=\"500\" data-v-543741ec=\"\"><\/source><\/source><\/source><\/source><\/picture> <span class=\"overlay\" data-v-543741ec=\"\">Video<\/span><\/a><\/div>\n<\/div>\n<div class=\"info\" data-v-543741ec=\"\">\n<div class=\"caption\" data-v-543741ec=\"\">\n<h4 class=\"title\" data-v-543741ec=\"\"><a href=\"https:\/\/www.foxnews.com\/video\/6361003200112\" data-v-543741ec=\"\">&#8216;CyberGuy&#8217;: How to avoid becoming a moving scam victim<\/a><\/h4>\n<p data-v-543741ec=\"\">For a safe move, pick a reliable mover and guard against scams with these steps from tech expert Kurt Knutsson.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"speakable\">A new malware has been detected by security researchers that is suspected of conducting espionage. Hackers infect devices by impersonating government agencies, usually tax agencies such as the Internal Revenue Service (IRS). Once the malicious software is on a PC, it can gather intelligence (collecting personal data, passwords and more), download additional malicious software and upload data to the hacker\u2019s server. It does all this while using Google Sheets to avoid suspicion and store data.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" id=\"tablet-tw-ad-lb2\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban1\" id=\"mobile-mw-ad-ban1\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p class=\"speakable\"><a href=\"https:\/\/cyberguy.com\/newsletter\/\" rel=\"nofollow\"><strong><u>GET SECURITY ALERTS, EXPERT TIPS \u2013 SIGN UP FOR KURT\u2019S NEWSLETTER \u2013 THE CYBERGUY REPORT HERE<\/u><\/strong><\/a><\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/1-A-new-malware-strikes-revealing-a-global-espionage-campaign-intro.jpg?ve=1&#038;tl=1\" alt=\"New Harry Potter-named malware strikes, revealing global espionage campaign\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>Illustration of computer being hacked by malware<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2><strong>It all starts with a fake email<\/strong><\/h2>\n<p>The hackers behind the malware, called &#8220;Voldemort,&#8221; have cleverly designed it to avoid getting caught. Just like the name Voldemort spelled trouble in J.K. Rowling\u2019s Harry Potter series, it\u2019s causing issues in the cybersecurity world, too.<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" id=\"desktop-desk-ad-lb2\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>The cyberattack kicks off when you receive an email that looks like it\u2019s from a government tax agency. According to <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort\" rel=\"nofollow\"><u>Proofpoint<\/u><\/a>, the hackers behind this campaign have been impersonating tax agencies in various countries, including the U.S. (IRS), the U.K. (HM Revenue &#038; Customs), France (Direction G\u00e9n\u00e9rale des Finances Publiques), Germany (Bundeszentralamt f\u00fcr Steuern), Italy (Agenzia delle Entrate) and, as of Aug. 19, India (Income Tax Department) and Japan (National Tax Agency). Each email lure was customized and written in the language of the tax authority being impersonated.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban2\" id=\"mobile-mw-ad-ban2\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Proofpoint analysts found that the hackers tailored their phishing emails to match the target\u2019s country of residence based on publicly available information rather than the organization\u2019s location or the language suggested by the email address. For example, some targets in a European organization received emails impersonating the IRS because they were linked to the U.S. in public records. In some cases, the hackers mixed up the country of residence when the target shared a name with a more prominent individual.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" id=\"tablet-tw-ad-lb3\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>The email also tries to mimic the email of the government agency. For example, the U.S. folks were sent fake emails using &#8220;no_reply_irs[.]gov@amecaindustrial[.]com.&#8221;<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/2-A-new-malware-strikes-revealing-a-global-espionage-campaign-email.jpg?ve=1&#038;tl=1\" alt=\"New Harry Potter-named malware strikes, revealing global espionage campaign\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>Email that tries to mimic the email of a government agency (Proofpoint)<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2><strong>The attack cleverly unfolds on your device<\/strong><\/h2>\n<p>In the fake email, hackers impersonating the government warn you about changes in the tax rates and tax systems and ask you to click a link to read a detailed guide. Clicking on the link brings you to a landing page, which uses Google AMP Cache URLs to redirect you to a page with a &#8220;Click to view document&#8221; button.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban3\" id=\"mobile-mw-ad-ban3\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>After you click the button, the hackers check if you\u2019re using a Windows device. If you are, you\u2019ll be redirected to another page. When you interact with that page, it triggers a download that looks like a PDF file in your PC\u2019s download folder, but it\u2019s actually an LNK or ZIP file hosted on an external server.<\/p>\n<p>When you open the file, it runs a Python script from another server without actually downloading the script to your computer. This script collects system information to profile you, while a fake PDF opens to hide the malicious activity.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/3-A-new-malware-strikes-revealing-a-global-espionage-campaign-outro.jpg?ve=1&#038;tl=1\" alt=\"New Harry Potter-named malware strikes, revealing global espionage campaign\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>Download that looks like PDF file in your PC\u2019s download folder (Proofpoint)<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2><strong>Voldemort uses Google Sheets to store data<\/strong><\/h2>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" id=\"tablet-tw-ad-lb4\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Once the malware has successfully infected your Windows device, it can:<\/p>\n<ul>\n<li><strong>Ping<\/strong>: Check if it\u2019s still connected to its control server<\/li>\n<li><strong>Dir<\/strong>: Get a list of files and folders on your system<\/li>\n<li><strong>Download<\/strong>: Send files from your system to the control server<\/li>\n<li><strong>Upload<\/strong>: Put files from the control server onto your system<\/li>\n<li><strong>Exec<\/strong>: Run specific commands or programs on your system<\/li>\n<li><strong>Copy<\/strong>: Copy files or folders on your system<\/li>\n<li><strong>Move<\/strong>: Move files or folders around on your system<\/li>\n<li><strong>Sleep<\/strong>: Pause its activity for a set time<\/li>\n<li><strong>Exit<\/strong>: Stop running on your system<\/li>\n<\/ul>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" id=\"desktop-desk-ad-lb3\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban4\" id=\"mobile-mw-ad-ban4\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>The malware uses Google Sheets as its command center, where it gets new instructions and stores stolen data. Each infected device sends its data to specific cells in the Google Sheet, marked by unique IDs to keep everything organized.<\/p>\n<p>Voldemort interacts with Google Sheets through Google\u2019s API, using an embedded client ID, secret and refresh token stored in its encrypted settings. This method gives the malware a reliable way to communicate without raising suspicion since Google Sheets is widely used in businesses, making it hard for security tools to block it.<\/p>\n<p><a href=\"https:\/\/cyberguy.com\/safety\/how-to-recognize-and-avoid-being-a-victim-of-vacation-rental-scams\/\" rel=\"nofollow\"><strong><u>HOW TO RECOGNIZE AND AVOID BEING A VICTIM OF VACATION RENTAL SCAMS<\/u><\/strong><\/a><\/p>\n<h2><strong>4 ways to protect yourself from malware attacks<\/strong><\/h2>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" id=\"tablet-tw-ad-lb5\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban5\" id=\"mobile-mw-ad-ban5\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Hackers are releasing increasingly sophisticated malware, but that doesn\u2019t mean you\u2019re defenseless. Below are some tips to help protect yourself from such attacks.<\/p>\n<p><strong>1) Read sensitive emails carefully:<\/strong> The best way to spot fake emails that deliver malware is to check them carefully. While hackers may be tech-savvy, their language skills often aren\u2019t perfect. For example, in the screenshots above, you can see typos like &#8220;Taxplayers&#8221; instead of &#8220;Taxpayers.&#8221; Government agencies don\u2019t usually make these kinds of mistakes.<\/p>\n<p><strong>2) Check email domain:<\/strong> Verify that the email domain matches the organization it claims to represent. For example, an email from the IRS should come from an address ending in &#8220;@irs.gov.&#8221; Be cautious of slight misspellings or variations in the domain.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban6\" id=\"mobile-mw-ad-ban6\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><strong>3) Invest in data removal services: <\/strong>Hackers target you based on your publicly available information. That could be anything from your leaked info through a data breach to the information you provided to an e-commerce shop. <a href=\"https:\/\/cyberguy.com\/privacy\/best-services-for-removing-your-personal-information-from-the-internet\/\" rel=\"nofollow\"><u>Check out my top picks for data removal services here<\/u><\/a><a rel=\"nofollow\"><u>.<\/u><\/a><\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" id=\"desktop-desk-ad-lb4\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb6\" id=\"tablet-tw-ad-lb6\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>4) Have strong antivirus software: <\/strong>If you have strong antivirus software installed on your device, it can protect you when you receive these types of scam emails or accidentally open the attachment or click a link. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. <a href=\"https:\/\/cyberguy.com\/security\/best-antivirus-protection\/\" rel=\"nofollow\"><u>Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices<\/u><\/a>.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/c\/KurttheCyberGuy?sub_confirmation=1\" rel=\"nofollow\"><strong><u>SUBSCRIBE TO KURT\u2019S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES<\/u><\/strong><\/a><\/p>\n<h2><strong>Kurt\u2019s key takeaway<\/strong><\/h2>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban7\" id=\"mobile-mw-ad-ban7\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>While researchers can\u2019t say for sure, many of the techniques used by the malware are similar to those employed by hackers suspected of espionage. Even if this assessment turns out to be incorrect, the scale and sophistication of the attack are concerning. Anyone without technical knowledge could easily fall victim and lose personal data and money. This attack specifically targets Windows users, which also raises questions about Microsoft\u2019s security framework.<\/p>\n<p>What measures do you think organizations should implement to better protect individuals from malware attacks? Let us know by writing us at<strong> <\/strong><a href=\"http:\/\/cyberguy.com\/Contact\" rel=\"nofollow\"><strong><u>Cyberguy.com\/Contact<\/u><\/strong><\/a><strong><u>.<\/u><\/strong><\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb7\" id=\"tablet-tw-ad-lb7\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to <a href=\"http:\/\/cyberguy.com\/Newsletter\" rel=\"nofollow\"><strong><u>Cyberguy.com\/Newsletter<\/u><\/strong><\/a><strong><u>.<\/u><\/strong><\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban8\" id=\"mobile-mw-ad-ban8\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/cyberguy.com\/contact\/\" rel=\"nofollow\"><u>Ask Kurt a question or let us know what stories you&#8217;d like us to cover<\/u><\/a><u>.<\/u><\/p>\n<p>Follow Kurt on his social channels:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.facebook.com\/CyberGuyOfficial\/\" rel=\"nofollow\"><u>Facebook<\/u><\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/c\/KurttheCyberGuy?sub_confirmation=1\" rel=\"nofollow\"><u>YouTube<\/u><\/a><\/li>\n<li><a href=\"https:\/\/www.instagram.com\/kurtthecyberguy\/\" rel=\"nofollow\"><u>Instagram<\/u><\/a><\/li>\n<\/ul>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" id=\"desktop-desk-ad-lb5\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Answers to the most asked CyberGuy questions:<\/p>\n<ul>\n<li><a href=\"https:\/\/cyberguy.com\/software\/best-antivirus-protection\/\" rel=\"nofollow\"><u>What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/privacy\/best-vpns\/\" rel=\"nofollow\"><u>What is the best way to stay private, secure and anonymous while browsing the web?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/how-to\/how-to-get-rid-of-robocalls-with-apps-and-data-removal-services\/\" rel=\"nofollow\"><u>How can I get rid of robocalls with apps and data-removal services?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/privacy\/best-services-for-removing-your-personal-information-from-the-internet\/\" rel=\"nofollow\"><u>How do I remove my private data from the internet?<\/u><\/a><\/li>\n<\/ul>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb8\" id=\"tablet-tw-ad-lb8\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban9\" id=\"mobile-mw-ad-ban9\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>New from Kurt:<\/p>\n<ul>\n<li><a href=\"https:\/\/cyberguy.com\/Games_FA\" rel=\"nofollow\"><u>Try CyberGuy&#8217;s new games (crosswords, word searches, trivia and more!)<\/u><\/a><\/li>\n<\/ul>\n<p><i>Copyright 2024 CyberGuy.com.\u00a0All rights reserved.<\/i><\/p>\n<div class=\"article-meta\">\n<div class=\"author-bio\">\n<p>Kurt &#8220;CyberGuy&#8221; Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News &#038; FOX Business beginning mornings on &#8220;FOX &#038; Friends.&#8221; Got a tech question? Get Kurt\u2019s free CyberGuy Newsletter, share your voice, a story idea or comment at <a href=\"https:\/\/cyberguy.com\/Newsletter\/\" target=\"_blank\" rel=\"nofollow noopener\">CyberGuy.com.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>close Video &#8216;CyberGuy&#8217;: How to avoid becoming a moving scam victim For a safe move, pick a reliable mover and guard against scams with these steps from tech expert Kurt Knutsson. A new malware has been detected by security researchers that is suspected of conducting espionage. Hackers infect devices by impersonating government agencies, usually tax [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17481,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,9],"tags":[],"class_list":["post-17480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tech"],"_links":{"self":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/comments?post=17480"}],"version-history":[{"count":1,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17480\/revisions"}],"predecessor-version":[{"id":17671,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17480\/revisions\/17671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media\/17481"}],"wp:attachment":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media?parent=17480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/categories?post=17480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/tags?post=17480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}