• Crimes. "Pay 1,000 euros ... or send your naked video to all your contacts"
  • Security: Spain leaves the future of its telecommunications in the hands of Chinese companies accused of espionage
  • Technology: The most used passwords are totally insecure
  • Tips: How to create a strong password and always remember it

It is supposed to be a moment of intimacy. However, it is not so. The security company Proofpoint has discovered a new malware that allows hackers to record the audio and video of the pornographic content that users are watching in order to extort them , which works through a system - called "Porn Module" - that relates the Pornography keywords registered in it with those of the titles of the content that its users have open on their devices.

The latest report by the security company has revealed the existence of this virus that provides cybercriminals with "tangible evidence of the activity carried out by their victims," as stated in a statement.

This malware is born from the hand of the remote access Trojan PsiXBot, which in September expanded its field of activity including a new module, the "Porn Module", which contains a dictionary with keywords related to pornography that is used to control titles of the windows that users have open on their devices.

If a window matches the text, it will start recording audio and video on the infected computer, as explained by the company. Thus, once recorded, the video is saved with an .avi extension (video format) and sent to the command and control server , then extort the user, point from Proofpoint.

On the other hand, the company has also discovered and made known in the report the return of Emotet, the banking Trojan that stole personal and confidential information from users entering the victims' devices through malicious emails, and that He had been missing for almost four months.

Emotet returned in the last weeks of September, according to Proofpoint, and accounted for almost 12 percent of all malicious email samples in the third quarter, delivering millions of messages with malicious urls or attachments. In addition, the group of hackers responsible for the distribution of Emotet, TA542, extended its regional objectives during this period to new countries, including Spain, Italy, Japan, Hong Kong and Singapore .

On the other hand, the report has revealed other outstanding data related to the threats suffered in this third quarter of 2019, among which stand out that malicious urls accounted for 88% of the combined global volume of malicious URLs and attached messages, which represents a "slight increase" compared to the second quarter.

In addition, the combined global volume of malicious urls and attached messages decreased by almost 40% compared to the second quarter during the first ten weeks of the quarter, "largely as a result of Emotet's absence."

The report also reveals that more than 26 percent of fraudulent domains used SSL certificates, more than triple the rate of domains on the Web. SSL certificates are global security standards that allow the transfer of encrypted files between a browser and a web service.

According to the criteria of The Trust Project

Know more

    RevenueCatRevenueCat, the app with a Sevillian soul that triumphs in Silicon Valley

    Video games: Goodbye to productivity: it's that easy to convert gifs into games with Giphy Arcade

    Antivirus Do not install the latest Windows update: it can block antivirus