There’s a whole new type of malware that has been making the rounds as of late. Whether you’re running the latest version of Windows or Mac, their built-in browser defenses are always watching out for threats — but the new IcedID malware has a few new tricks up its sleeve.

This virus is a bit of a nuisance, and here’s what you need to know about it.

What is IcedID?

IcedID is a malware application that gets installed on your computer without permission. Once it is downloaded, it connects to a network of other hacked computers to spread the malware.

Currently, it’s finding exploits in places like Skype and Dropbox. This just goes to show that these file-sharing and video conferencing applications are not encrypted, and therefore not a secure channel to send confidential information! If it overtakes your system, then IcedID would be able to send data, steal PII you type in online, and even hijack your webcam and microphone.

The IcedID is not a new strain of malware. Its first known appearance was reported years ago, the brainchild of a group called C2 Team. This infection targets users of the application icedid.net and tries to steal important financial information that allows them to access your bank funds.

How to Clean Your System

So far security experts, have observed the malware spreading through infected Windows 10 systems. IcedID has been found on many computers, and it even has been found on computers that used to have anti-virus programs like Malwarebytes installed.

The icedid.com browser hijacker virus is one of the worst threats out there right now, and it is important that you remove such malware as quickly as possible. A couple of weeks ago, there was an important update to fix the problem; it’s important to set auto-updates so that malware doesn’t continue to cause problems a second longer than it has to. Defer to the advice given by your IT team first before doing anything!

Conclusion

IcedID has been evolving and returning every time security experts find a fix for the latest iteration. Malware always changes, trying to get the better of our latest and greatest technologies. New threats are also popping up all the time, as threat actors invent more effective ways of stealing your personal information and hijacking your applications or devices.

Staying aware of what threats are out there will help you recognize and report them as you encounter suspicious behavior out in the wild. Additionally, remember to set auto-updates whenever possible so that zero-day vulnerabilities are patched as soon as possible — even if you’re not onsite to manually perform an update at that time. You can also set devices to update at a regular time when you’re guaranteed to be off-site, so as not to mess with the flow of operations.

Find what works best for you! Together, people and technology can protect our most precious data from breaches of privacy.

References