Yesterday the horrible mass mosque shooting in New Zealand made the headlines, fifty people were killed. A gunman used GoPro to transmit a live stream of the massacre at a mosque.
Despite social media companies immediately removed the content from their platforms it is still possible to find multiple copies of the shooting videos online.
YouTube issued a statement condemning the snuff videos, confirming that it is removing them from its platform.
Unfortunately, curious people are searching for the video of the
New Zealand mosque shooting and crooks are aware of that and are attempting to exploit the interest in the cruel footage.
In the wake of the New Zealand mosque shooting, the Cybersecurity and Infrastructure Security Agency (CISA) recommends users to remain vigilant on possible scams and malware attacks.
Government experts are warning of spam campaigns using messages containing links pointing to malware or using malicious attachments.
“Users should exercise caution in handling emails related to the shooting, even if they appear to originate from trusted sources.” reads the security advisory published by the US-CERT. “Fraudulent emails often contain links or attachments that direct users to phishing or malware-infected websites.”
Experts believe attackers could use fake emails requesting donations from charitable organizations are, the US-CERT warns of fraudulent social media pleas, calls, texts, donation websites, and door-to-door solicitations relating to the event.
To avoid becoming a victim of malicious activity, users have to use caution when opening email attachments, even if the messages are sent from trusted sources. Another best practice consists of avoiding to click on links in unsolicited email messages.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – New Zealand mosque shooting, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…
An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…
Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…
Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…
Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…
Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…
This website uses cookies.