Don’t Let NFT Curiosity Let Hackers Hijack Your Computer

This is NFA, but if you see 1:1 generative art freshly beaten at the start of a new SZN you should use DYOR before moving liquidity. Otherwise you are NGMI and you may lose a lot more than 5ETH and a few NFTs.

Do not worry. You didn’t suddenly lose the ability to read or understand. But unfortunately, the world of non-fungible tokens (NFTs) is full of jargon and complex, which can easily confuse people curious about the technology. Tap or click here for everything you need to know about NFTs.

And it is this unfamiliarity with NFTs that hackers and scammers are now taking advantage of to install malware on your devices. Learn how hackers target art lovers with malicious code.

Here’s the backstory

NFTs are a complicated concept. Essentially, it is something (a JPG file, digital art, or music) irreplaceable and unique. Makers put an item up for sale (called coins). When users buy it (often with the cryptocurrency), they own it. Think of it like buying an original, digital version of real art.

Creations have different values ​​depending on the question and who made it. Anyone interested in NFTs can look for a good tip or score a bargain to resell. And that’s where criminals often show up, waiting to make some money of their own.

Your daily dose of tech smarts

Learn the tech tips and tricks only the pros know.

Fortinet found an Excel document online that claimed to contain details about NFTs. But after analyzing the spreadsheet, they realized it contained malware that could steal personal information.

The file contains a macro, an executable action in many Excel documents. But instead of warning new NFTs, it downloads and installs BitRAT malware in the background. This malware then tries to download a data file with a JPG extension, making it look like an image or photo.

According to Fortinet“BitRAT can bypass User Account Control and Windows Defender. In addition, this variant can also monitor the screen and, if present, use the webcam.”

Once the malware is installed, it can also:

Steal credentials from browsers and applicationsMy Monero cryptocurrencyLog keystrokesUpload and download additional filesListen live through a microphone

What can you do about it?

Like most things online, never open a link or download an attachment if you don’t know or trust the source. Use extreme caution if you receive a file via an unsolicited message that claims to have valuable information about digital products or services.

Here are some more tips to stay safe:

For starters, you should never download Word or Excel files attached to unsolicited emails. If you open one of these documents and it says to enable macros, close the file and delete it immediately. Dischord chat application is now more commonly used to host malicious content. If you receive a link that redirects to Dischord, use extreme caution before downloading anything. Make sure to use strong antivirus software on all your gadgets. And keep them up to date for the best protection. This is the best way to avoid infecting your device with malware. We recommend our sponsor, TotalAV† Get an annual subscription now from TotalAV Internet Security for only $19 at† That’s over 85% off the regular price.

keep reading

Tech Refresh: Windows woes, NFT craze, Clubhouse copycat app


Your daily dose of tech smarts

Learn the tech tips and tricks only the pros know.

10 Cryptocurrency Terms People Use Every Day That You Should Know

Leave a Reply

Your email address will not be published.