PEC Attack: The Spread Of sLoad Malware

What is Malware? It is malicious software that, once installed on a user’s computer, can cause various problems such as deletion or blocking of data, sending spam or collecting personal information. The damage caused by malware can be irreparable and, in some cases, can even put a company’s IT security at risk. Malware is usually spread via infected emails or websites.

What Is SLoad Malware?

The sLoad malware is a trojan that spreads via PEC. Usually, it comes as a ZIP or PDF file attached to an email message. If the user opens the file, the malware installs itself on the computer. It starts doing harmful things, such as stealing personal information, locking the computer or sending spam to other users.

sLoad is by no means a novelty in the cyber security panorama, so much so that last January, more than 100,000 certified e-mail boxes were infected very quickly. More recently, in October 2022, the AgID reported another malspam campaign on its website to disseminate a variant of the salad malware to the PEC boxes of companies and organizations.

PEC And Malware

The power of sLoad and malware spread via PEC is that certified mail is more secure than traditional email. After all, unlike regular e-mail, PEC uses an encrypted protocol, making it difficult for malicious people to intercept messages. However, this false certainty leads users to let their guard down. Added to this is the fact that the infected messages are very credible.

Structure Of The Infected PEC Message

As explained by AgID, an infected PEC message resembles a standard email, complete with a subject and dynamic internal links, i.e., capable of changing according to the recipient to make the message more credible. The body of the email can refer to different topics. For example, the October malware campaign exploited the topic of non-payments and, therefore, carried wordings such as “Invoice payment reminder letter” or “Late payment of invoice”.

The text always contains a ZIP attachment to download or a link to click (in the case of the October campaign, the link referred to the alleged unpaid invoice). When clicked, the link starts the automatic download of a file or a ZIP folder containing decoy files with common extensions, such as jpeg or pdf, and an executable file of type WSF which, when opened, starts the installation of the malware. Obviously the user does not notice the installation nor, at first, its consequences.

How To Defend Against sLoad Malware?

To defend yourself against this malware, having tools to protect your computer network to detect and analyze traffic and block any threats in the bud is essential. However, since malware spreads via PEC, the real difference is made by the awareness of the user, who must pay close attention to the e-mail messages he receives.

It is, in fact, essential to recognize suspicious messages, even when they come from known senders, and, above all, not to download attachments or click on links that you need to be sure of. Furthermore, having a good antivirus and regularly updating the software used to limit vulnerabilities is beneficial. Finally, even if this is the primary element, choosing a reliable PEC manager is good.

Pec: Safe And Comfortable

Namirial has been accredited by AgID and authorized to manage Certified Electronic Mailboxes and domains since 2007. It has about 1 million customers and has already disbursed 800,000 PECs. The PEC is the most complete solution on the market, which combines an advantageous price with many features:

  • Each shipment and each delivery are certified,
  • The advanced archiving service automatically saves a copy of incoming messages and receipts in a separate and secure area,
  • You can download messages and receipts directly to your devices with your favorite email client or access the web version with any browser, allowing sharing access to the PEC mailbox with other users, with their accounts, in total security.

You can choose between 3 different plans:

  • PEC mailbox for companies – €29.00 + VAT per year: 2GB of inbox space + 6GB of security archive for saving a copy of messages and receipts, Fattoria service for easy consultation of electronic invoices, Multi-user service included.
  • Professional PEC mailbox – €19.00 + VAT per year: 2GB of inbox space + 3GB of security archive for saving a copy of messages and receipts, – eInvoice service for easily consulting electronic invoices.
  • Business PEC mailbox – €49.00 + VAT per year: 2GB of inbox space + 13GB of security archive for saving a copy of messages and receipts, – eInvoice service for easy consultation of electronic invoices, – Multi-user service included.

Also Read: Best Ways To Defend Against Cyber Attack

TechSmashers
Tech Smashers is a global platform that provides the latest reviews & news updates on Technology, Business Ideas, Gadgets, Digital Marketing, Mobiles, Updates On Social Media and many more up coming Trends.

RECENT POSTS

Streamlining Financial Processes: The Benefits of Modern Accounting Software

In the fast-paced environment of modern business, it is essential to efficiently handle finances. It is key to ensure the prosperity and development of...

Top 5 Best Portable Consoles In 2024

The most recent age compact control center is intended to offer a functional and complete gaming experience with perpetually noteworthy execution. Versatile game control...

How Modern Smartphones Have Revolutionized Journalism

The world has gone entirely digital; everything is now accessible online, from products and services to information. The introduction of technological innovations, such as...

The CIA Did Not Break The Encryption Of WhatsApp, Signal, Or Telegram

If encrypted messaging applications do not appear to be compromised by the CIA, the agency is using numerous techniques to take control of mobile...

Leveraging Customer Opinions to Boost Online Engagement

In the dynamic landscape of digital commerce and information exchange, the power of customer opinions has never been more influential. Today's savvy businesses are...

WiFi: 5 Constraints To Manage When Deploying A Network

The constraints on a WiFi deployment project are incredibly numerous. A necessary phase for any project is to define the need to size the...

How To Install Windows 11/10 On Your Mac With UTM

If you use a Mac equipped with an Apple Silicon (M1, M1 Max, or M2) or Intel (x86/64) processor, you will be delighted to...

The Role Of HR Management In The Digital Transformation Paths Of Organizations

Starting and managing a Digital Transformation path in the company does not only mean equipping yourself with innovative tools and methodologies but also acting...