Cybercriminals are spreading zombie malware in a campaign using “Black Lives Matter” to trick victims according to abuse.ch, a community-focused cybersecurity website.
These threat actors are covertly spreading their attack precisely without affiliating politically and socially with any side while calling on potential victims into commenting anonymously on the trending issues using short messages with an attachment through email.
The threat actors’ message remains simple, no manipulation or coercion to make their malicious plan look so genuine but containing the zombie malware-attachment that does the job for them. The attachment contained in the email consist of macros embedded with a program code written in the Visual Basic for Application programming language (VBA).
While the message and its content appear simple, today’s VBA is now potent and as dangerous. It can be compared to Delphi, Python, Perl, and other similar programming languages with ready to install-to run local autonomous apps.
How Does Zombie Malware Work?
After receiving the zombie malware-infested Black Lives Matter campaign, the first thing that is seen if a victim runs the macros is a Windows-like error message. It contains one of those “recognizable eight-digit codes”, which is an error which has been proven to be fake posing as a decoy for the zombie malware downloader.
When granted opened, it initiates the download and installation of a strain of zombie malware called Trickbot used to gain unauthorized access to victim’s financial data.
Tips To Protect Your Digital Device From Zombie Malware
SecureBlitz cybersecurity experts advise internet users not to click nor open unsolicited attachments, doing otherwise is giving cybercriminals access to your sensitive documents.
Keep all security features on your computer active and up to date. They can protect your digital devices from malicious attacks.
Periodically reboot your computer, experts believe some malware, virus, or trojan find it difficult to remain active after a system has been rebooted.
Use a reputable anti-virus/anti-malware software on your system, make sure you have an active subscription on such anti-malware software so that you do not expose any part of your computer protection to hackers.