{"id":5091,"date":"2024-10-31T09:19:35","date_gmt":"2024-10-31T09:19:35","guid":{"rendered":"https:\/\/sysdojo.com\/?p=5091"},"modified":"2024-10-31T09:22:26","modified_gmt":"2024-10-31T09:22:26","slug":"beware-this-malware-it-annoys-you-into-handing-over-login-details","status":"publish","type":"post","link":"https:\/\/sysdojo.com\/corp\/beware-this-malware-it-annoys-you-into-handing-over-login-details\/","title":{"rendered":"Beware this malware: It &#8220;annoys&#8221; you into handing over login details"},"content":{"rendered":"\n<p>How cautious are you and your team with online security? You know about phishing scams, dodgy downloads, and not clicking suspicious links, right? But an even sneakier new malware (that\u2019s malicious software) wants to frustrate you into giving up your <a href=\"https:\/\/sysdojo.com\/corp\/1-in-4-people-struggle-with-password-overload-heres-the-answer-password-manager\/\" data-type=\"link\" data-id=\"https:\/\/sysdojo.com\/corp\/1-in-4-people-struggle-with-password-overload-heres-the-answer-password-manager\/\">Google login<\/a> details.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/10\/USwc2024-11-04-BlogarticleLinkedInnewsletterimage-1024x576.jpg\" alt=\"\" class=\"wp-image-5092\" srcset=\"https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/10\/USwc2024-11-04-BlogarticleLinkedInnewsletterimage-1024x576.jpg 1024w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/10\/USwc2024-11-04-BlogarticleLinkedInnewsletterimage-300x169.jpg 300w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/10\/USwc2024-11-04-BlogarticleLinkedInnewsletterimage-768x432.jpg 768w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/10\/USwc2024-11-04-BlogarticleLinkedInnewsletterimage-1536x864.jpg 1536w, https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/10\/USwc2024-11-04-BlogarticleLinkedInnewsletterimage.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The <a href=\"https:\/\/sysdojo.com\/corp\/are-those-chrome-extensions-filled-with-malware\/\" data-type=\"link\" data-id=\"https:\/\/sysdojo.com\/corp\/are-those-chrome-extensions-filled-with-malware\/\">malware<\/a> doesn\u2019t have a catchy name yet, but it\u2019s part of a larger threat known as \u201cAmadey\u201d, and it\u2019s been on the rise since August.<\/p>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"1080\" style=\"aspect-ratio: 1920 \/ 1080;\" width=\"1920\" controls src=\"https:\/\/sysdojo.com\/corp\/wp-content\/uploads\/2024\/10\/USwc2024-11-04-Techupdatevideoreadytouse.mp4\"><\/video><\/figure>\n\n\n\n<p>It forces your PC into something called \u201c<a href=\"https:\/\/blog.suitebriar.com\/chrome-kiosk-mode-what-is-it-how-does-it-work\" data-type=\"link\" data-id=\"https:\/\/blog.suitebriar.com\/chrome-kiosk-mode-what-is-it-how-does-it-work\" target=\"_blank\" rel=\"noopener\">kiosk mode<\/a>\u201d (a setting often used on public computers that only lets you access one window). This allows it to lock your browser in full screen mode, hiding all your usual navigation buttons like the address bar and menus. Then you get sent to a fake Google password reset page.<\/p>\n\n\n\n<p>Normally, you\u2019d just hit the Esc or F11 keys to get out of full screen mode, right? Well, not this time. It won\u2019t work if the malware has infected your PC. It wants to confuse you into thinking you must enter your password to solve the problem.<\/p>\n\n\n\n<p>The password reset page will look like a real Google page. But the second you type in your details, they\u2019ll be stolen by a second piece of malware hiding in the background, falling right into the hands of cyber criminals.<\/p>\n\n\n\n<p>Pretty scary stuff.<\/p>\n\n\n\n<p>But here\u2019s the good news: You can break free without giving up your details.<\/p>\n\n\n\n<p>If your browser gets stuck in full screen mode, try hitting ALT+TAB to switch tasks, or ALT+F4 to force the window to close. Otherwise, try closing it through your task manager (CTRL+ALT+DELETE).<\/p>\n\n\n\n<p>If all else fails, just restart your PC by holding down the power button or unplugging it, then get an expert (like us) to look at the malware.<\/p>\n\n\n\n<p><a href=\"https:\/\/sysdojo.com\/corp\/more-businesses-are-proactively-investing-in-cyber-security-defenses\/\" data-type=\"link\" data-id=\"https:\/\/sysdojo.com\/corp\/more-businesses-are-proactively-investing-in-cyber-security-defenses\/\">Prevention<\/a> is always the best approach, though. Be wary if your computer starts behaving strangely, especially if your browser suddenly goes into full screen mode and won\u2019t let you navigate away.<\/p>\n\n\n\n<p>Avoid clicking on suspicious links or downloading attachments you aren\u2019t sure about. And as tempting as it might be to get past an annoying screen, never enter your password unless you\u2019re 100% sure the website is legit.<\/p>\n\n\n\n<p>In today\u2019s digital landscape, malware attacks like this one are becoming more sophisticated, often capitalizing on user frustration to trick people into revealing sensitive information.<\/p>\n\n\n\n<p>This particular malware is an example of a \u201csocial engineering\u201d attack\u2014a tactic where cyber criminals manipulate individuals into breaking standard security practices. By locking users into a frustrating, restrictive mode and simulating a real Google page, the malware\u2019s creators play on people\u2019s desire to solve the issue quickly.<\/p>\n\n\n\n<p>The goal is to trigger a quick, unthinking response, so users are more likely to enter their login details without second-guessing the situation.<\/p>\n\n\n\n<p>To protect yourself and your organization from threats like this, it\u2019s essential to keep your security software up-to-date and to enable multi-factor authentication (MFA) wherever possible. MFA adds an extra layer of security by requiring an additional verification step, such as a code sent to your phone, which makes it much harder for unauthorized users to gain access to your accounts\u2014even if they do manage to steal your password.<\/p>\n\n\n\n<p>Educating your team on the latest cyber threats and implementing regular security training sessions can also greatly reduce the risk of falling victim to such attacks. When employees know what to look for, they\u2019re more likely to recognize the signs of a scam before any damage is done.<\/p>\n\n\n\n<p>Finally, as cybersecurity threats evolve, it\u2019s vital to adopt a \u201czero-trust\u201d mindset, where no link, email, or attachment is automatically trusted. Encourage a culture of healthy skepticism within your team, prompting them to question unusual requests for login information or unexpected prompts to enter sensitive details.<\/p>\n\n\n\n<p>Remember, cybercriminals are always innovating, but by staying vigilant, reinforcing strong security practices, and taking proactive measures, you can minimize the risks and keep your data safe from threats like this frustrating malware. If you\u2019d like us to teach your team how to avoid the latest scams, we can help. Get in touch.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A sneaky new malware wants to annoy you into giving up your login details. It locks your browser in full screen mode, making you think you\u2019re trapped. But you can easily escape and we\u2019ll tell you how.<\/p>\n","protected":false},"author":3,"featured_media":5092,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[54],"class_list":["post-5091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-malware"],"_links":{"self":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts\/5091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/comments?post=5091"}],"version-history":[{"count":1,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts\/5091\/revisions"}],"predecessor-version":[{"id":5094,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/posts\/5091\/revisions\/5094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/media\/5092"}],"wp:attachment":[{"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/media?parent=5091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/categories?post=5091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sysdojo.com\/corp\/wp-json\/wp\/v2\/tags?post=5091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}