fbpx

HOW HACKERS DELIVER MALICIOUS PAYLOAD TO MEDIA PROFESSIONALS

Must Read

Destiny Young
Destiny Younghttp://linktr.ee/youngdestinya
Destiny Young is a highly credentialed information technology professional with over 14 years of industry experience. An HND/BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a Distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a First-class MSc degree in Digital Transformation. His professional development direction is in Cybersecurity, Digital Transformation, and Business Intelligence. He is a member of the British Computer Society (BCS), the Chartered Institute of Administration of Nigeria (CIA), the Nigeria Computer Society (NCS), etc.


Cybersecurity Warning!

Today, I discovered a surprising trick used by hackers to target media professionals and media organisations.

I saw an interesting piece of information about the Labour Party Vice Presidential Candidate, Ahmed Datti on someone’s Facebook post.

I wanted to copy and publish it on my timeline, but unfortunately, the post did not come with the picture of Ahmed Datti. So, I decided to search for his picture on Google and add to my post to make it more appealing to read by my network and friends.

Using Google Image, I saw quite a number of his pictures and I chose the one I deemed of having a more better quality.

All these actions took place on my laptop computer.

Just when I clicked to download the picture, my antivirus software pops up with a notice that it has blocked a particular script from running on my web browser and that it has also stopped a certain file from being downloaded alongside the picture into my computer. I took time to analyse the reported file and the accompanying script, I found out it has the ability to escalate system account privilege and assume the Admin level rights on my system, which would translate to having full control of my computer and other associated computers if on a corporate network.

To break into pieces the premise upon why I brought this to your knowledge, it is pertinent to enlighten Media professionals, media organisations and media freelancers of the potential cyber threats posed by hackers who use backdoor mechanisms to infiltrate your system.

How Hackers Deliver their Malware into your Device:

Often, Media houses rely on Google searches to source pictures of events, people and places, to add “colour” to their reports. Cognizant of this, hackers deliver their malicious payload using images of much talked about people, events and places.

The moment you download the picture into a device without a licensed antivirus software with latest virus signature, a malicious script is downloaded and automatically executed in the device browser.

The script can do a lot of things, including stealing your stored log in credentials for your social media accounts, banking logging credentials, and other vital information stored in your device.

Recommendation:

1. Ensure you have a licensed antivirus software installed in your device.

2. Ensure the virus signature database of the antivirus software is regularly updated to enable it detect zero day vulnerability (latest hacking method or loopholes).

3. Enable Realtime protection in the antivirus software setting.

This is an effort aimed at safe internet.

Be guided accordingly.

Yours,

YOUNG, D

Cybersecurity Analyst

Destiny Young
Destiny Young is a highly credentialed information technology professional with over 14 years of industry experience. An HND/BSc (Hons) in Computer Science graduate. He holds a Master of Technology degree in Information Technology from the prestigious University of South Africa (UNISA). He is a Distinction-grade MBA alumnus of Nexford University, Washington, DC, where he also obtained a First-class MSc degree in Digital Transformation. His professional development direction is in Cybersecurity, Digital Transformation, and Business Intelligence. He is a member of the British Computer Society (BCS), the Chartered Institute of Administration of Nigeria (CIA), the Nigeria Computer Society (NCS), etc.
- Advertisement -spot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisement -

Latest News

National Digital Economy and E-Governance Act 2024: THE DIGITAL TRANSFORMATION ERA

For effective execution of the provisions under this Act, there shall be established in every public institution an ICT Unit with such number of staff as may be required for efficient performance, effective service delivery, and digital transformation of functions in the respective public institution.
- Advertisement -

More Articles Like This

- Advertisement -