MENU × BUSINESS
Banking And InsuranceCryptocurrencyDigital MarketingErpFood And BeveragesHealthcareLegalMarketing And AdvertisingMedia And EntertainmentMetals And MiningOil And GasRetailTelecom
TECHNOLOGY
Artificial IntelligenceBig DataCloudCyber SecurityE CommerceEducationGaming And VfxIT ServiceMobileNetworkingSAPScience And TechnologySecuritySoftwareStorage
PLATFORM
CiscoDatabaseGoogleIBMJuniperM2MMicrosoftOracleOracleRed Hat
LEADERSHIP
CEO ReviewCompany Review
MAGAZINE
ASIA INDIA
STARTUPS CLIENT SPEAK CONTACT US

The Silicon Review Asia

Hackers haven’t given up yet; stay away from pirated and duplicate files

Hackers haven’t given up yet; stay away from pirated and duplicate files

Likely the ransomware hackers are going to stay for few more days among all of us for the obvious reason that they are still one step ahead of all of us, be it in technology or crime.

After taking the world by storm, the miscreants’ new target to hack systems and encrypt it is by spreading fake movie subtitles. Hackers can now acquire full control of the desktop system by disposing the malware through fake movie subtitles that shall notify the hackers affecting users of video players like Popcorn Time and VLC system.

In recent news, Checkpoint has stated that it found the malware in the form of subtitle files that can allow hackers the command to encrypt code into subtitle files popular with mostly pirated movies. Users, who search for subtitles for movies or series, naively trust those files and falls prey to such attacks. Checkpoint states:

“Our research reveals a new possible attack vector, using a completely overlooked technique in which the cyberattack is delivered when movie subtitles are loaded by the user’s media player. These subtitles repositories are, in practice, treated as a trusted source by the user or media player; our research also reveals that those repositories can be manipulated and be made to award the attacker’s malicious subtitles a high score, which results in those specific subtitles being served to the user. This method requires little or no deliberate action on the part of the user, making it all the more dangerous.”

It’s time you choose your every move cautiously and probably absent yourself from malice operations, apps and files.

YOU MAY ALSO LIKE

Tariff plans will cost higher from the next financial year as telecom companies are gearing up to increase rates

The ongoing Covid pandemic had significantly increased the number of mobile and internet users worldwide. The high amount of usage is expected to drop...

Business Travelers to Stay at Singapore’s Changi Airport Bubble

Singapore’s open economy depends heavily on tourism and business. But its vibrant but small economy has been hurting as the circumstances due to...

Countries in Asia-Pacific are marching towards ‘green recovery’ amidst Covid-19 crisis

2020 has been an unforgettable year for many of us. The ongoing Covid crisis has reminded people that it is very important to have an uninterrupted an...

Department of Telecommunication to announce the new schedule for 5G trials

Department of Telecommunications (DoT) is all set to announce the new schedule for 5G trials. The Dot made this decision after being pulled by the par...

RECOMMENDED