New phishing campaign uses interest in James Webb telescope photos to lure users with malware, analysts warn.
Fraudsters attempted to insert malware into an image of NASA’s SMACS 0723 galaxy cluster, according to a study conducted by the security company Securonix.
The image may seem safe at first glance, but opening it in a text editor will reveal malicious code that will download an executable.
JWST images
NASA released the first James Webb Telescope photos of star formation in July 2022. Full-color photographs spread quickly on social media.
Demand for additional James Webb Telescope photos has created an opening for cybercriminals, as with any trend or event that draws public attention.
Threat actor sends phishing email with Microsoft Office attachment. Once downloaded, the attachment begins a chain reaction that instals a malicious image on the victim’s device.
Because of this, the malicious software written in Golang has the ability to steal sensitive data and give the user control of the computer that it has hacked.
Users of the web should avoid downloading files from unsolicited emails at all costs and should double check their writing for any typos or grammatical errors.
Even if the malware can evade security safeguards, machines should still be secured with antivirus and ransomware protection software to limit the risk of infection.