Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation
laptop with ransomware attack image on it

Lookout! There Is A Clever New Type Of Ransomware On The Loose.

Cyber scams seem to be a hot topic at the moment. And now cyber criminals have come up with a new trick that you need to be aware of. 

It's time to face the facts - they are good at what they do. They’re forever coming up with new ways to infiltrate your devices and networks to access your valuable data.

Fortunately, on the flipside, the defensive weapons continue to improve and get better to help keep you protected. Some email systems are now better at identifying malicious messages and threats, and even better with a spam filtering platform right on top.

But if your website has a contact form, which most of them do, you face a new threat. Cyber criminals are now using web forms to spread malware and here is how it works.

They ask you to provide a quote for them for your goods and services by posing as a potential new customer. 

After you email your reply to their request, they'll send you an ISO file that they say is relevant to your conversation.

Crucially, this file will not be attached to the email. They’ll send it via a file-sharing service, such as WeTransfer. This is a way to avoid your email provider's protection systems.

The person who is managing this conversation likely believes they are talking to a prospective customer, and so is more likely to open the files without thinking.

The fact that the conversation started with a contact form lowers their natural skepticism, and c'mon, who doesn't want the sale?!

No alt text provided for this image

Opening the file will give cyber criminals access to your device. And that can allow them to access your full network which can then lead them to launch a malware or ransomware attack.

A ransomware attack is something you want to avoid at all costs. It's where all your data is encrypted and it is then useless to you. And you have to pay a large ransom fee to get it back… typically in bitcoin, with absolutely no guarantees the payment will work.

From what we have seen, we believe that this particular form of contact form attack is being used more frequently. It may have first been tested in December 2021, and may now be becoming more popular.

It’s vital that you and your team check requests sent via your website are genuine and do not open any files received in an email unless you are 100% sure of the source.

Until next time, keep fit and have fun!

(TYYV) The Yada Yada Version:

There is a new type of cyber attack that is becoming increasingly popular. Cyber criminals are posing as potential new customers asking for a quote for your goods and services through your website contact form. After you email them a nice reply they'll send you an ISO file via file-sharing and yada yada yada you are now the victim of a ransomware attack and need to pay a lot of money, usually in bitcoin, to get all of your data back with no guarantee that the payment will actually work. Make sure you and your team check requests sent via email and do not click on any links you are not 100% sure of.

Mitch Redekopp
Article Written by Mitch Redekopp

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Featured image
Why Haven't You Upgraded to Windows 11 Yet?
With Windows 10 support ending in just over a year, many business owners are asking themselves why they haven't switched to Windows 11. Are you one of them? Sur...
Featured image
How to Cheat the Blue Screen of Death
Encountering the Blue Screen of Death (BSOD) on your computer can be a frustrating experience. That sudden blue screen usually means something went wrong, and i...
Rivercity Technology Services LTD logo
We are your IT department. How would you like to manage your risk?
201-116 Research Dr,
Saskatoon, SK
S7N 3R3

306-933-3355

Copyright © 2024 - All Rights Reserved

crossmenu