You'd better learn news from media, not from emails, security experts warn us users again.
Numerous emails with "breaking news" in subject lines are appearing in users' inboxes. If you got one, don't look into such a message -- delete it straight away. Don't open its attachment. Those who distribute malicious code take advantage of our curiosity. They use especially effective social engineering techniques to lure users into opening attachments and following links.
Is there anybody who wouldn't like to be the very first one to learn breaking news or see something really exciting? For example, something like:
"Osama bin Laden caught",
"Saddam Hussein has died",
"Michael Jackson tried to commit suicide".
Would you like to open a message with such a subject line and learn what's in it? You'd better not. There are malicious programs inside these "news" waiting for you to click.
These (and similar) tricks are usually called social engineering. Online criminals have become good psychologists. They are ingenious in finding new ways to make people do what they want -- open an attachment or click on a link to visit a certain website. For these unprincipled rogues it's all right to profiteer from human tears and blood -- they actively use news about tragic events as a bait.
One of the latest, detected by Trend Micro in mid-July, was a spam e-mail with "TERROR HITS LONDON," subject line. It mimicked a CNN newsletter and asked the recipients to "see attachments for unique amateur video shots." When a user opened the attachment, his PC gets infected with the Trojan horse program named Troj_DonBomb.A
On August 5th another one was reported by Sophos-- an email disguised as an alert about the death of 140 US marines in Iraq. The email claims to contain a breaking news report from Guardian Unlimited and has a link to the "full story" which leads users to a bogus web page with two Trojans built in.
Cgab-A and Borodr-Fam Trojans slip through unpatched Internet Explorers. These Trojans will allow the criminal to take full control over the infected PC; they also be collecting the user's personal information and using his computer to send more copies of thesmselves.
It's not the first time these emails are disguised as news alerts -- there were outbreaks when infected spam posed as CNN news. It seems that spoofing legitimate news agencies to infect more PC users by means of bogus "news alerts" has become a popular social engineering technique. And by all means there will be more of them in future.
So, it's better not to learn any news from e-mail messages. Try to resist the temptation to open email with some REALLY BREAKING NEWS.
Don't open, don't click. And patch your browser.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security. The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-spy software truly unique: it doesn't detect spy programs or information-stealing Trojans one by one -- they all simply can't work.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Have you ever had to call Symantec or McAfee to... Read More
Shopping for horse gifts or other gift items on the... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
A couple of years back, I paid my dues the... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
When the Internet first came about, it was realized it... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
P C. owners are constantly at risk from attacks by... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
With the Internet entering our lives in such an explosive... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Over the past few years as the internet has become... Read More
Pharming is one of the latest online scams and rapidly... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Over £5 billion pounds was spent on online shopping in... Read More
You are at your computer, checking out software on EBay.... Read More
Imagine this ? you open up your email box and... Read More
Spyware is software or hardware installed on a computer without... Read More
Let us take the example of scrambling an egg. First,... Read More
At this point, if you've got the whole "turning the... Read More
First I would like to stress I am condoning the... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Today the internet is a mine field of malicious code... Read More
Can you protect your computer from all possible viruses and... Read More
History and BackgroundThe virus was one of the first ever... Read More
Spyware is the most troublesome software to appear on the... Read More
If you are wondering how to fight spyware for safe... Read More
Business on the internet is getting down right shameless. This... Read More
You can detect spyware online using free spyware cleaners and... Read More
Working from home has its advantages, including no commute, a... Read More
Before you enter your name, address or any other data... Read More
This is the second in a series of articles highlighting... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Business on the internet is getting down right shameless. This... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
With the Internet entering our lives in such an explosive... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
In a word, no - an email message has always... Read More
In 1997, I decided after 15 years as a practicing... Read More
You'd better learn news from media, not from emails, security... Read More
In recent days, I was one of the unfortunate persons... Read More
Ok, ok, I know you've seen them. All those pop... Read More
A new variation of the Nigerian Scam theme ... Read More
First off I should explain what phishing is. Phishing is... Read More
The Threat10 years ago you could probably have run no... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Long gone are the days that we could feel secure... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
During the release of a new software product specialized to... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Phishing is the act of some individual sending an email... Read More
Security leaks can be a big problem for any site... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
A week or so ago, I received an inquiry from... Read More
If you use the internet, you have probably been infected... Read More
Ebay is a great site and is used by many... Read More
Spyware is software or hardware installed on a computer without... Read More
Internet Security |