Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
Threatpost
Posts tagged "fake"
Warning: this fake Windows 11 upgrade is filled with malware
Security researchers have found a fake Windows 11 upgrade website that promises to offer a free Windows 11 install for PCs that don’t meet the minimum specifications, but actually installs data-stealing malware.
Windows 11 has some… interesting… requirements to run, and its most famous demand is for Trusted Platform Module (TPM) version 2.0 support. This has led to perfectly capable, and powerful, PCs and laptops being unable to upgrade to Windows 11, as they did not meet the minimum specifications.
Understandably, this annoyed people with relatively new hardware that couldn’t upgrade to the latest version of Windows, and many looked at ways of circumnavigating the TPM 2.0 requirement to install Windows 11 on their unsupported devices.
It’s these people that this new threat is targeting, as Bleeping Computer reports.
Looking legitimate
While the website’s address (URL) should be a red flag (we won't mention it here), as it’s clearly not a Microsoft website, the actual website itself does look like it’s an official Microsoft website, using logos and artwork that makes it difficult to tell it apart from a real Microsoft page.
However, as security researchers CloudSEK discovered by clicking the ‘Download now’ button, the website downloads an ISO file that contains malware.
This malware, called ‘Inno Stealer’, uses a part of the Windows installer to create temporary files on an infected PC. These create processes that run and place four additional files on your PC, some of which contain scripts that disable various security features, including in the Windows registry. They also tweak the built-in Windows Defender anti-virus, and remove other security products from Emisoft and ESET.
Other files then run commands at the highest system privileges, while yet another file is created in the C:\Users\AppData\Roaming\Windows11InstallationAssistant folder, and it’s this file that contains the data-stealing code, named Windows11InstallationAssistant.scr. This then takes information from web browsers, as well as cryptocurrency wallets, stored passwords and files from the PC itself. This stolen data is then sent to the malicious users who created the malware.
Pretty nasty stuff.
Analysis: Be careful what you wish for
The scale of the infection here, and what it’s able to steal from you, is very scary, but the good news is that it’s easy to avoid.
No matter how desperate you are to install Windows 11, you should only download ISO files from sources you are absolutely certain are legitimate. While the makers of this malware have put in a lot of work to make the website look legitimate (like many so-called ‘phishing’ attacks), there are some tell-tale signs, such as the aforementioned URL, which highlights that this is not a genuine Microsoft website.
If your PC is eligible for a Windows 11 upgrade, you’ll be alerted via Windows Update, a tool that’s built into Windows operating systems. This is the safest way to ensure you are downloading and installing a genuine copy of Windows 11.
If your PC isn’t eligible, due to not meeting the TPM 2.0 requirements, then there are some safer ways to install Windows 11 without TPM anyway. But we don’t really recommend any of them, especially as Microsoft is making it harder to run Windows 11 on unsupported systems, which could mean you miss out on important updates, security fixes and features in the future.
Above all, however, you should never attempt to download and install a Windows 11 ISO file from any website that isn’t run by Microsoft itself.
Surfshark backpedals on Fake News feature after barrage of criticism
Following a surge in propaganda coinciding with Russia's invasion of Ukraine, the VPN provider Surfshark recently released a new fake news warning feature for its browser extensions for Chrome and Firefox.
At the time, Surfshark CEO Vytautas Kaziukonis explained why the company decided to release the feature in a press release, saying:
“The 21st century has shown that information might be sharper than the sword. It’s evident that today’s disinformation campaigns aim to distract, confuse, manipulate, and sow division, discord, and uncertainty in the community. Keeping in mind the intensifying propaganda, we decided to release a feature that would allow people to identify fake news websites easily.”
Surfshark's now defunct fake news warning feature would detect specific URLs from a list of untrustworthy websites taken from the site propornot.com reviewed by the the company's security experts. Sites known for spreading fake news were highlighted with a “YYY” symbol in Google and other search engines. While the feature was enabled by default, Surfshark users were able to toggle it off under the “VPN settings” menu in the company's browser extension.
Suspending its fake news feature
Although Surfshark's intentions were good, the company explained in a post on Twitter that “the topic is more nuanced that initially thought” when it announced that it would be temporarily suspending its fake news notification feature only a few days after its launch.
The problem with the feature is that in addition to being overwhelming for some users, it identified far too many sites as being a source of disinformation. Some of the sites that had a “YYY” next to them on Google's search results page included Drudge Report, Ron Paul's website, the alternative video platform BitChute and even WikiLeaks.
While consumers rely on VPN services to protect their privacy online and to get around geo-blocking, many of the users that responded to a separate post on Twitter by BitChute took issue with Surfshark limiting freedom of expression online. At the same time, BitChute pointed out that several major news stories in the last year were considered 'misinformation' before being revealed to be true.
Despite the fact that Surfshark has said that it would temporarily suspend the feature, its original blog post announcing its fake news notifications has been removed from its site. We'll have to wait and see as to whether or not the company decides to bring it back though based on the criticism the feature faced online, it likely won't be returning anytime soon.
- We’ve also rounded up the best proxy services and the best privacy apps
Cloned Dept. of Labor Site Hawks Fake Government Contracts
A well-crafted but fake government procurement portal offers the opportunity to submit a bid for lucrative government projects — but harvests credentials instead.
Threatpost
Apple iPhone Malware Tactic Causes Fake Shutdowns to Enable Spying
The ‘NoReboot’ technique is the ultimate in persistence for iPhone malware, preventing reboots and enabling remote attackers to do anything on the device while remaining completely unseen.
Threatpost
Threat Advisory: E-commerce Bots Use Domain Registration Services for Mass (Fake) Account Creation
Jason Kent is Hacker-in-Residence at Cequence Security.
Threatpost
Flubot Malware Targets Androids With Fake Security Updates
The banking trojan keeps switching up its lies, trying to fool Android users into clicking on a fake Flubot-deleting app or supposedly uploaded photos of recipients.
Threatpost
NFT Collector Tricked into Buying Fake Banksy
An attacker breached the site of famed street artist Banksy to host a fraudulent NFT auction but then gave back the money.
Threatpost
How Fake Accounts and Sneaker-Bots Took Over the Internet
Jason Kent, hacker-in-residence at Cequence Security, discusses fake online accounts, and the fraud they carry out on a daily basis.
Threatpost
Criminals are distributing fake VPN installers with backdoors built in
Legitimate Windscribe VPN installers are being bundled with malicious files that contain backdoors.