{"id":143600,"date":"2022-08-04T20:23:27","date_gmt":"2022-08-05T01:23:27","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/08\/virustotal-reveals-most-impersonated-software-in-malware-attacks"},"modified":"2022-08-04T20:23:27","modified_gmt":"2022-08-05T01:23:27","slug":"virustotal-reveals-most-impersonated-software-in-malware-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/08\/virustotal-reveals-most-impersonated-software-in-malware-attacks","title":{"rendered":"VirusTotal Reveals Most Impersonated Software in Malware Attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/virustotal-reveals-most-impersonated-software-in-malware-attacks.jpg\"><\/a><\/p>\n<p>Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and increase the likelihood of a successful social engineering attack.<\/p>\n<p>Other most impersonated legitimate apps by icon include 7-Zip, TeamViewer, CCleaner, Microsoft Edge, Steam, Zoom, and WhatsApp, an analysis from VirusTotal has revealed.<\/p>\n<p>\u201cOne of the simplest social engineering tricks we\u2019ve seen involves making a malware sample seem a legitimate program,\u201d VirusTotal <a href=\"https:\/\/blog.virustotal.com\/2022\/08\/deception-at-scale.html\" rel=\"noopener\" target=\"_blank\">said<\/a> in a Tuesday report. \u201cThe icon of these programs is a critical feature used to convince victims that these programs are legitimate.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and increase the likelihood of a successful social engineering attack. Other most impersonated legitimate apps by icon include 7-Zip, TeamViewer, CCleaner, Microsoft Edge, Steam, Zoom, and WhatsApp, an analysis from VirusTotal has revealed. \u201cOne [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-143600","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/143600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=143600"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/143600\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=143600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=143600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=143600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}