sb-nz logo
Story image

Huge growth in malware connected to popular musicians - Kaspersky

Kaspersky detected a 39% rise in attacks (attempts to download or run malicious files) under the guise of nominees’ work in 2019, compared to 2018. Ariana Grande, Taylor Swift and Post Malone were attackers’ favourites, with these nominees’ names used most often in 2019 as a disguise for malware.

The popularity and widespread availability of modern music is a powerful lure for malicious activity: criminals use popular artists’ names to spread malware hidden in music tracks or video clips.

Kaspersky researchers analysed Grammy 2020 nominated artists’ names and song titles for malware. As a result, Kaspersky found 30,982 malicious files that used the names of artists or their tracks in order to spread malware, with 41,096 Kaspersky product users having encountered them.

Analysis of the nominated artists showed that the names of Ariana Grande, Taylor Swift and Post Malone were used most to disguise malicious files, with over half (55%) of detected malicious files named after one of the trio.

The number of attempts to download or run the files containing names of these pop stars also grew significantly for almost all artists in the research.

The connection between the rise in popularity and malicious activity is very evident in the case of newer artists such as Billie Eilish.

The number of users who downloaded malicious files with her name has risen almost tenfold compared to 2018 – from 254 to 2171. In addition, the number of unique distributed malicious files rose from 221 to 1,556 during the same period.

A nomination for a prestigious award affects seems to correlate with an increase in malicious activity connected to the artist’s name. However, this is not necessarily the case for more established artists such as Lady Gaga, whose name use also experienced a rise in attacks in the past year.

Kaspersky also analysed which records and songs received the most attention from cybercriminals. Post Malone’s ‘Sunflower’, Khalid’s ‘Talk’ and Lil Nas X’s ‘Old Town Road’, led the way for songs with the most malware attacks.

“Cybercriminals understand what is popular and always strive to capitalize on that,” says Kaspersky security analyst Anton Ivanov.

“Music, alongside TV shows, is one of the most popular types of entertainment and, as a result, an attractive means to spread malware, which criminals readily use.

“However, as we see more and more users subscribe to streaming platforms, which do not require file download in order to listen to music, we expect that malicious activity related to this type of content will decrease,” says Ivanov.

Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More
Story image
Case study: How Pattern helped SimTutor secure online education
SimTutor provides a software-as-a-service (SaaS) solution designed for online healthcare education and e-learning content creators.More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Claroty discovers vulnerabilities in Ovarro TBox RTUs
The vulnerabilities could enable attackers to break into the systems and run code, crash systems, and meddle with configuration files, amongst other malicious actions.More
Story image
Identity in the age of eKYC & digital onboarding journeys
When an onboarding process is architected correctly, there are tangible benefits for customer satisfaction.More