June 30, 2024

News Collective

Complete New Zealand News World

They use one of the most popular Windows 11 software to access the PC

They use one of the most popular Windows 11 software to access the PC

You should be aware of the latest campaign from hackers To take control of your computer, as well as your money, they use software known to you available at Windows 11 operating system as it’s like in Windows 10 operating systemto infect your device.

specially hackers Fraudulent files are attached from One note in emails phishing They infect remote access malware capable of stealing passwords and also accessing your cryptocurrency wallets.

If you didn’t already know, Microsoft One note It is a free downloadable digital notes application that is included in many other packages such as Office or Microsoft 365.

In fact, you probably have OneNote installed by default Windows 10 operating system s Windows 11 operating systemin a file format that your operating system will recognize if you end up receiving it attached to an email.

Comment from sleeping computerHackers send phishing emails posing as companies like Microsoft to get you to double-click a OneNote-like attachment.

Apparently, many people fall into this trap, because not only do many of these emails try to make you think they’re official from Microsoft, but they also impersonate different courier companies, so if you’re waiting for a package, it’s probably over until you open it. .

While the operating system warns that opening OneNote attachments in email can be risky, especially from unknown senders, many people hold back.

What happens if I install this malware

As they say, this malware allows hackers to gain remote access to a victim’s computer to steal their files, but also to obtain browser passwords, take screenshots, access a cryptocurrency wallet and even record videos with a webcam.

See also  Roomba vacuum cleaner records woman on toilet and photos end up on Facebook

The best way to protect yourself from these types of attacks is not to open files from people you don’t know, or even from well-known companies, if you’re really not expecting something.

If you are infected, it is convenient to run an antivirus, change access passwords for programs, a cryptocurrency wallet, and even if you are not afraid of losing information, format your hard drive.