Roboto Condensed, the hacker attack that exploits a fake font

Computer security researchers have discovered a new threat, called Roboto Condensed, that installs trojans and adware on our PC

Computer security researchers have noticed a new threat that has been affecting several notebook and desktop PC users since August 2017. The malware is called Roboto Condensed and it spreads through malicious sites in a similar way to adware and keyloggers.

The virus acts in a very simple way. When we enter the infected site we will see a pop-up on our screen warning us that we need to install the extension called Roboto Condensed Font Pack in order to view the portal properly. If the user falls into the trap and agrees to download the extension update it will give the green light to the malware. Once installed on our PC, Roboto Condensed infects the machine with trojans (aimed at stealing our information), adware and “special” viruses that exploit the computer’s CPU to generate Bitcoin or other cryptocurrencies.

Roboto Condensed

So getting caught in Roboto Condensed’s trap is not pleasant. Our machine will be infected with a series of malware that will make it virtually impossible for us to use the machine. In the last weeks of September 2017, according to the investigations of cybersecurity researchers, the virus was slightly modified. Now Roboto Condensed when it hits a PC installs mostly adware. For what reason? Because these particular viruses guarantee immediate profit for cyber criminals and are very easy to install on a malicious site or program. However, it should be pointed out that the viruses installed on our PCs change depending on the type of browser and operating system we use. In some cases Roboto Condensed also installs new paid programs on our computer, not necessarily malignant ones, with the sole purpose of making money for cyber criminals who made the fake apps.

Evolving viruses

Computer security researchers are particularly worried about Roboto Condensed. The virus is constantly being modified to be difficult to detect and stop. Some hackers make money from adware, others exploit trojans more to steal our information and others or use them to generate virtual coins.