PRODAFT Identifies And Investigates New Kurisu Sextortion Malware - ZEX PR WIRE


(MENAFN- Zex PR Wire)

Zürich, Switzerland, 7th September 2022, ZEXPRWIRE , Sextortion efforts are becoming more focused as criminals look to victimize users. A new threat, Kurisu, identified by PRODAFT in May is a particularly dangerous example, with its creators using user photographs to extort ransoms from unwitting victims.

 

Users install Kurisu as part of a fake“private” browser. It functions as a keylogger, monitoring activity for when users visit adult web content, taking screenshots and webcam photos to use as evidence to maximize users' fears of being exposed. 

As malware threats are becoming more personalized and menacing for extortion purposes, sextortion is a growing target. Originally criminals sent out mass emails making spurious claims that people had been visiting pornographic sites or watching adult content in an attempt to cajole the guilty-minded into paying up.

Now Kurisu represents a new threat level and PRODAFT has analyzed the activities of those responsible, identifying the scale, intent, and origin of the cyber attacks, as well as the communications they use and their home nations.

PRODAFT's threat intelligence platform monitors thousands of sources to identify and prevent attacks, and can help law enforcement identify the actors, while enabling you to respond to cyber security threats that threaten your business and workers.

CTA: See the full report ( ) for more details, and how to protect your business from cyber threats.

Media Contact

Company Name:-PRODAFT

Email:-[email protected]

Company Website:-

MENAFN07092022004812010992ID1104828913


Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.