Cybersecurity, ransomware hides in resumes

Hackers allegedly targeted HR managers: once opened, the fake resume infects victims’ machines

The means available to hackers have reached a sophisticated level that is difficult to stop for those trying to protect cybersecurity. In most cases, however, it is mainly the inattention of users that facilitates the dirty work of cyber criminals.

Malware, ransomware, viruses require the “cooperation” of the victim to infect the device. Without it, it would be really difficult. An application downloaded from unofficial sources, a link opened superficially, an attachment viewed without checking the reliability of the sender, may, in fact, contain malicious code within them. Let’s take, for example, ransomware, software that encrypts the data of compromised devices and plague especially companies and institutions. The preferred channel through which it strikes are, in fact, emails opened by a distracted employee.

The ransomware that affects HR

Sometimes, however, it is really difficult, despite the right precautions, to stop the spread of these malicious programs. Especially for those who are forced to view millions of files. According to some information, ransomware is affecting the computers of HR, i.e. corporate HR managers. The hackers’ modus operandi is wicked: they use a fake resume or cover letter as a Trojan Horse. Once opened, the attachment instead downloads malware onto the machines of poor victims, sure to view the employment history of an alleged candidate.

How to Protect Yourself

Human Resource Managers are prone to fall into the trap orchestrated by hackers mainly because of the extension of the files attached to emails: PDF, DOC and XLS. On the surface. In reality they have a different origin. Normally, in fact, they appear with the final part in .exe. How to protect yourself? The first thing to do is to avoid opening suspicious emails. Then carefully check the real extension of the file. Before downloading the attachment, you should preview it. And above all, remember to install a good antivirus.

Never let your guard down

Let’s go back to the starting point. This case is further proof of the risks we encounter on the Internet on a daily basis. It becomes, therefore, essential to pay particular attention to our online behavior. Sempre se vogliamo evitare che i nostri dati finiscano nelle mani degli hacker.

Come difendersi dagli attacchi hacker

Cliccando sui link che seguono, invece, potrete scoprire suggerimenti, alcuni più tecnici altri più alla portata di tutti, riguardanti la sicurezza informatica e scoprire le tipologie di attacchi più comuni: dagli attacchi DDoS al phishing, passando per le botnet.

  • Dai cyber terroristi ai White hat hacker, ecco chi sono e cosa fanno
  • Proteggere la privacy e dati personali, i consigli dell’esperto
  • Sei consigli per mettere al sicuro la vostra piccola o media impresa
  • Dieci consigli per non cadere nella trappola di una e-mail phishing
  • Come proteggere la tua mail con Password Sicura: cos’è e come funziona
  • Salvarsi dagli hacker: 5 errori da non commettere
  • Allarme virus, trojan e ransomware, la guida per difendersi
  • Cosa sono i ransomware e come si diffonde il contagio
  • Pericolo ransomware: come difendersi con buone pratiche e antivirus
  • Dilemma ransomware: è possibile fermare il “virus del riscatto”?
  • Attacco ransomware: piccole e medie imprese in pericolo
  • Cosa sono gli attacchi DDoS, come nascono e come difendersi
  • Cos’è il phishing? Una pericolosa truffa: ecco come non abboccare
  • Privacy online: ecco come salvaguardare i nostri dati personali
  • Come creare una password forte per proteggere l’identità online
  • Addio ai furti di password, ecco la verifica in due passaggi
  • I migliori password manager per mettere al sicuro i propri dati