diff --git a/sources/news/20210831 Ransomware Disguised as Open-Source Krita Painting App Promo Video.md b/sources/news/20210831 Ransomware Disguised as Open-Source Krita Painting App Promo Video.md new file mode 100644 index 0000000000..80108b8fde --- /dev/null +++ b/sources/news/20210831 Ransomware Disguised as Open-Source Krita Painting App Promo Video.md @@ -0,0 +1,76 @@ +[#]: subject: "Ransomware Disguised as Open-Source Krita Painting App Promo Video" +[#]: via: "https://news.itsfoss.com/krita-email-scam/" +[#]: author: "Ankush Das https://news.itsfoss.com/author/ankush/" +[#]: collector: "lujun9972" +[#]: translator: " " +[#]: reviewer: " " +[#]: publisher: " " +[#]: url: " " + +Ransomware Disguised as Open-Source Krita Painting App Promo Video +====== + +Ransomware attacks are exponentially increasing. And, the way it gets distributed evolves every day. + +One of the most effective ways is by using reputable brand names to lure users into downloading malicious files that may end up encrypting your files and demand a ransom. + +And, in this case, some scammers have started using Krita’s name to deceive users through email. + +### Spreading Malware via Email as Krita Officials + +The attackers disguise themselves as the team for Krita, one of the best [digital open-source painting app][1]. + +The email mentions that Krita wants to collaborate with your YouTube channel or your social media space to share promotional videos about their software/product. + +And, they mention that this is a paid advertising campaign, so you think you are getting a reward for promoting Krita. + +Here’s how the email looks like (as shared by [Krita on Twitter][2]): + +![][3] + +Once you show interest in promoting Krita, they send you a follow-up mail instructing you to download a press kit containing screenshots, videos, and other materials. + +The link may look similar to the official one like _krita.io, krita.net_, etc. + +In a detailed video shared by a Twitter user, you can see that the link they share is malicious and sometimes goes undetected by Google’s safe browsing feature: + +> Recently, I received the same email. Though I know this is likely a scam, I decided to proceed further just to see how far will they take us. They asked me to download some files and you can watch the full video here: [pic.twitter.com/P1K2tlHiT4][4] +> +> — Inside Electronics (@InsideElectro) [August 29, 2021][5] + +While I agree that this is not the best attempt to distribute malware, not everyone is as attentive as this user here. + +### Never Trust an Email Without Proper Verification + +It is easy for attackers to send you emails that you expect or something that may spark an interest in your work. + +Scammers do their homework to know what you like, but always stay cautious no matter what or who appears to be sending the email. + +If an email explicitly asks to enter your personal information, download an attachment, or visit a website to download a file, you need to double-check if it comes from an official source. + +Generally, officials do not ask you to download any file or personal information unless you took action first. So, it is always wise to think twice and run a background check for what you interact with via emails. + +#### Big Tech Websites Get Millions in Revenue, It's FOSS Got You! + +If you like what we do here at It's FOSS, please consider making a donation to support our independent publication. Your support will help us keep publishing content focusing on desktop Linux and open source software. + +I'm not interested + +-------------------------------------------------------------------------------- + +via: https://news.itsfoss.com/krita-email-scam/ + +作者:[Ankush Das][a] +选题:[lujun9972][b] +译者:[译者ID](https://github.com/译者ID) +校对:[校对者ID](https://github.com/校对者ID) + +本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出 + +[a]: https://news.itsfoss.com/author/ankush/ +[b]: https://github.com/lujun9972 +[1]: https://itsfoss.com/open-source-paint-apps/ +[2]: https://twitter.com/Krita_Painting/status/1432295734074880003 +[3]: data:image/svg+xml;base64,PHN2ZyBoZWlnaHQ9IjI3OSIgd2lkdGg9IjU4MCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB2ZXJzaW9uPSIxLjEiLz4= +[4]: https://t.co/P1K2tlHiT4 +[5]: https://twitter.com/InsideElectro/status/1431938502862663680?ref_src=twsrc%5Etfw