This family includes software that uses a vulnerability in the method that Microsoft Color Management Module uses to process ICC profile format tags. ICC profile data can be embedded into different file formats, including JPEG, GIF, and TIFF. This exploit allows the attacker to execute
arbitrary code in the vulnerable system by using a malicious image on a website or in an email attachment.
Top 10 countries with most attacked users (% of total attacks)
|Country||Percentage of users*|
* Percentage of all unique Kaspersky users worldwide who have been attacked by this malware
Is your business effected by Cyber Crime?
If a cyber crime or cyber attack happens to you, you need to respond quickly. Cyber crime in its several formats such as online identity theft, financial fraud, stalking, bullying, hacking, e-mail fraud, email spoofing, invoice fraud, email scams, banking scam, CEO fraud. Cyber fraud can lead to major disruption and financial disasters. Contact Digitpol’s hotlines or respond to us online.
Digitpol’s Cyber Crime Investigation Unit provides investigative support to victims of cyber crimes. Digitpol is available 24/7. https://digitpol.com/cybercrime-investigation/
UK +44 20 8089 9944