For people of my age and generation and I’d guess for most readers of Darknet, Michael Jackson would have had a great influence on our lives.
The biggest news last week was most certainly his death, as usual the bad guys were extremely quick to capitalize on this and were sending out spam within hours of the announcement.
It was suspected malware would follow shortly after, and it did according to F-secure.
Within hours of the death of pop star Michael Jackson, spam trading on his demise hit inboxes, a security firm said today as it warned that more was in the offing.
Just eight hours after news broke about Jackson, U.K.-based Sophos started tracking the first wave of Jackson spam, which used a subject head of “Confidential — Michael Jackson.” The spam wasn’t pitching a product or leading users to a phishing or malware Web site, but instead was trying to dupe users into replying to the message in order to collect e-mail addresses and verify them as legitimate.
“The body of the spam message does not contain any call-to-action link such as a URL, e-mail or phone number,” said Sophos in its company’s blog today. “But the spammer can harvest receivers’ e-mail addresses via a free live e-mail address if the spam message is replied to.”
The original versions were just plain old spam to harvest addresses, but later malware laden versions followed which dropped IRC bots and backdoors detected as “Trojan.Win32.Buzus.bjyo”.
It’s sad to see such things happening, but social engineering attacks to spread malware are always expected when some big news like this breaks.
Nothing is sacred to the dark side of the Internet.
The timing of that campaign was not coincidental: It followed Jackson’s acquittal on all charges in child sexual abuse. “The news of his suicide attempt was believable,” said Cluley, who noted that scammers and hackers often trade on tragedies to get people to click links. In that case, users were hit with a hacker toolkit that tried several exploits against Internet Explorer.
“I wouldn’t be surprised to see hackers claiming that they have top-secret footage from the hospital, perhaps [allegedly] taken by the ambulance people, that then asks you to install a video codec,” said Cluley, talking about a common malware ploy. Users who click on the supposed codec update link are, in fact, then infected with attack code, often a bot that hijacks their computer.
So do warn people, if someone e-mails them pictures or videos claiming to be secret or exclusive footage surrounding the death of Michael Jackson – it’s most likely an infection vector.
Common sense prevails, but is sadly not common.
Source: Network World
- Flash Zero Day Being Exploited In The Wild
- Sony Digital Certs Being Used To Sign Malware
- Twitter Patents Technique To Detect Mobile Malware
- Brittany Murphy Dies & Scareware Scammers Strike
- The Associative Word List Generator (AWLG) – Create Related Wordlists for Password Cracking
- A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor
Most Read in Malware:
- Nasty Trojan Zeus Evades Antivirus Software - 77,346 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,485 views
- US considers banning DRM rootkits – Sony BMG - 44,939 views