Netvora logo
Submit Startup Subscribe
Home About Contact Submit Startup Subscribe

Cybercriminals Using Unicode Braille Character to Hide Malware-Infected Files

Comment

Cybercriminals Using Unicode Braille Character to Hide Malware-Infected Files

Cybercriminals Using Unicode Braille Character to Hide Malware-Infected Files

Cybercriminals Using Unicode Braille Character to Hide Malware-Infected Files

By Netvora Tech News


Cybersecurity firm Mandiant has uncovered a new tactic used by cybercriminals to spread malware: hiding executable files with a unicode Braille character. This clever trick allows attackers to disguise malicious files as harmless video files, making it easier for unsuspecting victims to open and install the malware.

The scheme involves setting up fake "AI video generator" websites that promise users they can create videos using artificial intelligence. These websites are promoted through advertisements on Facebook and LinkedIn, luring users in with the promise of easy video creation.

How the Attack Works

Once users visit the malicious site and follow the prompts to generate a video, they are offered a zip file containing a executable file with a double extension, such as ".mp4.exe". To conceal the executable extension, the attackers use the "Braille pattern blank" character, a special whitespace character from the Braille Patterns unicode block.

This character is typically used to display Braille patterns, but in this case, it allows the attackers to hide the ".exe" extension, making the file appear to be a harmless video file. The executable file is also adorned with the standard Windows ".mp4" icon, making it even more convincing.

The Consequences

When users open the executable file, they are presented with an error message, while in the background, malware is installed. This malware steals login credentials, cookies, credit card information, and Facebook data, giving attackers access to sensitive information.

Mandiant advises users to exercise caution when using AI tools and to thoroughly verify the legitimacy of websites before using them. This latest tactic highlights the importance of staying vigilant and up-to-date with the latest cybersecurity threats.

  • Be cautious when using AI tools and websites that promise easy video creation.
  • Verify the legitimacy of websites before using them.
  • Be wary of zip files with executable extensions.

Comments (0)

Leave a comment

Back to homepage