You'd better learn news from media, not from emails, security experts warn us users again.
Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links.
Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like:
"Osama bin Laden caught",
"Saddam Hussein has died",
"Michael Jackson tried to commit suicide".
Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click.
These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait.
One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A
On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in.
Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves.
It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future.
So, it's better not to learn any news from e-mail messages. Try to resist the temptation to open email with some REALLY BREAKING NEWS.
Don't open, don't click. And patch your browser.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work.
Learn more -- visit the company's website http://www.anti-keyloggers.com
This is not some new fangled techno-speak, it is a... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Whether we like it or not, we are all living... Read More
Working from home has its advantages, including no commute, a... Read More
With the advent of the World Wide Web, a whole... Read More
The money being spent online is steadily growing. With billions... Read More
Did you know...? 1 in 5 children who use computer... Read More
Can you protect your computer from all possible viruses and... Read More
Huge number of spyware software applications are available in the... Read More
Despite the current wave of identity theft and corporate security... Read More
There has not been a time in the history of... Read More
If you run any type of Internet business, Adware and... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Someone recently told me, "You would have to be a... Read More
By browsing a web page, you could infect your computer... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Today,on most internet user's computers, we have the ability to... Read More
Nobody wants to pay to remove spyware. At the very... Read More
As soon as almost all computer users already got used... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
File sharing on p2p is soaring despite the music and... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Spyware is the most troublesome software to appear on the... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
This is the second in a series of articles highlighting... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Recently I have received email from my bank/credit Card Company,... Read More
What is computer security? Computer security is the process of... Read More
A friend called me one day and asked if I... Read More
You'd better learn news from media, not from emails, security... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Spyware and adware are becoming major problems for online surfers... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Whether we like it or not, we are all living... Read More
As more people are logging onto the Internet everyday, Network... Read More
The words Corporate Security may conjure up images of a... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Have you ever got an email asking you to confirm... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
There is no doubt that "how-to articles" have become a... Read More
My first experience with a spyware BHO based infection was... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Spyware is software that runs on a personal computer without... Read More
I am the victim of an internet scam. It is... Read More
First of all we need to get some terms stated.... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
During the release of a new software product specialized to... Read More
When the Internet first came about, it was realized it... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Have you ever had to call Symantec or McAfee to... Read More
You've seen it in the news - 40 million credit... Read More
Sooner or later everyone with an email account will receive... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Paypal is a great site and is used by many... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Watching how the traditional media covers the latest virus or... Read More
Business on the internet is getting down right shameless. This... Read More
Internet Security |