The Italian application named Immunicode> by the Italian Bending Spoonscode> company, is a software that serves to fight epidemics, including those of covid-19code> . It keeps track of a data by which it is possible to trace the device of the person with whom a person, once recognized as infected, has been in contact. This application is for βvoluntaryβ use, recently the firmware of the manufacturers have updated to prepare to prepare for the use of this application that has already been uploaded to apple and android stores but that has not yet been activated as far as we know.
Tracking should be done via an identification code that changes over time and all data should remain in the mobile phone until it is transmitted to the medical authorities in case of contagion. Data should be stored on servers managed by public entities and should still be deleted no later than December 31, 2020. We will not dwell too much on the details because that is not the purpose of this article.
On the website of theAgid-Cert
, which is a government structure dealing with cybersecurity, the information has been disclosed that someone would use the notoriety of the application Immuni
to download software of the type ransomware named FuckUnicorn
that would be able to infect the systems involved for encrypt the contents of the memory. The purpose of this malicious code would be to blackmail the victim by asking him to pay to unlock the data inside his device.
The first alarm, would be issued publicly on Twitter by @JAMESWT_MHT
which points out that downloading a named file IMMUNI.EXEcode> can be responsible for this issue. The news would then be verified by the who Agid-Certcode> wrote a very detailed explanatory article about this possible issue.
In fact, the practice of creating executables with famous application names for the purpose of infecting a computer device, is not a new practice. In fact, it is not uncommon for the victim, involuntarily or not and for various reasons, to download an executable file that could encrypt the contents of the memory in the device of the unfortunate for the purpose of blackmail and not only this.
We also believe that it is useful to specify to the less experienced in the industry that this malicious code has nothing to do with the application or the company that developed Immunicode> it. Cybersecurity has become an integral part of the tech world due to constant scams and attacks that are thought and carried out on a daily basis.
This article does not aim to describe the technical or explanatory issue in detail. For this reason we refer you to the sources 1, 2, 3, 4, 5.
It is important that before downloading any software, regardless of the nature of the software, you are aware that the source is trusted. In case of imperfection, little experience or doubts we recommend that you consult with a cybersecurity expert.