Webwyrm malware is rampant: 100,000 victims in 50 different countries

Although the network has no borders, malware campaigns usually present themselves with some specific connotations with respect to a territory or continent.

However, there are also rare exceptions to this rule: this is the case of Webworm, a malicious agent that is spreading online at an impressive rate. We are in fact talking about a world-class campaign, which counts today 100,000 victims in 50 countries. The malware in question is capable of imitate over 1,000 famous companiesmanaging to contextualize itself perfectly in any type of area.

According to experts, potential losses related to Webwyrm could exceed 100 million dollars: this last data gives an even better idea of ​​the scope of this malevolent agent.

We are talking about a system of tactics, techniques and procedures (TTP) advanced, difficult to detect and dismantle. Analyzing the situation was CloudSEKwho then shared the data collected with law enforcement agencies around the world.

Webwyrm: a trap for those looking for easy money online

Webwyrm scammers target victims on social network and on messaging appin particular WhatsApppossibly focusing on job seekers, therefore referring to recruitment portals.

They lure victims with fake job offers, requiring deposits cryptocurrency on platforms like KUCOIN o SHAKEPAY.

Victims, once engaged, create accounts related to the organization and receive 100 Tether USDt (USDT). Initially the system seems to work, with good profits. The system, however, leads the user to remain stuck in an infinite loop, running out of money in the bank account to “acquire” the possibility of working.

Once the victim is contacted by the referrer/cybercriminal, the user is forced to continue his work under the threat of freezing cryptocurrency accounts. In fact, it is a complex system, which leverages the need to find a job to trap the unfortunate victims.

Experts, therefore, recommend the maximum caution when dealing with an online job offer, advising maximum attention if it appears too advantageous.

Source: cybersecuritynews.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here