Monday, March 4, 2024

Hackers Distribute Malware Disguised as Pirated Online Textbooks & Essays

Cybercriminals distribute malware disguised as textbooks and essays that downloaded from pirated websites.

The costs of materials posted by the university are high. which leads students to look for a free or low-cost alternative’s online.

Taking this as an advantage, malicious hackers post malicious content among the study materials and advertise them for free.

Malware as textbooks and essays

The malware found to be distributed as a school- and student-related filenames that are posted for free access.

According to the Kaspersky report, 233,000 attacks by malware disguised as malicious essays and 122,000 attacks by masked ass textbooks. Over 30,000 users tried to open these files.

“English textbooks hiding malware were most popular among K-12 students with 2,080 attempted downloads. Math textbooks were the next most common, nearly infecting the computers of 1,213 students. Literature closes out the top three most dangerous subjects with 870 potential victims.”

Cybercriminals also target less popular subjects ass textbooks in the natural sciences and foreign languages at both the K-12 and college levels.

Here is the list of top four malware distributed as textbook and essays.

MediaGet downloader – While clicking on download buttons, MediaGet downloader gets downloaded instead of the document that you are looking for.

WinLNK.Agent – hide in archives of textbooks and essays that you are looking for.

Win32.Agent – Disguised as a textbook or an essay in DOC, DOCX or PDF format.

Stalk worm – Distributed via malicious contents and essays.

The cost of textbooks force the students to look for an alternative, according to a study, “students took fewer courses because of textbooks cost.”


  • Pay alert to the files that you are downloading.
  • Use updated versions of operating systems and other software.
  • Use a reputable Antivirus program.
  • Check the Integrity of the website before downloading.
  • Inspect the download URL’s

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News update.


Latest articles

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles