Kim Jong-il malware circulating

Powered by SC Magazine
 

Spammers capitalise on leaders' death.

Spam messages with malicious attachments have been detected with subject lines referring to the death of Kim Jong-il.

Some messages contained a .pdf attachment named ‘brief_introduction_of_kim-jong-il.pdf' which contained a malicious trojan.

Trend Micro anti-spam research engineer Michael Casayuran said the trojan, TROJ_PIDIEF.EGQ, opened a non-malicious pdf file that contained a picture of Jong-il and a short biography of the former North Korean leader.

“Aside from this particular spam attack, we've also encountered malicious documents that bear file names mentioning Kim Jong-il.," Casayuran said.

Another malicious Word document related to North Korea's nuclear programmes and was detected as trojan TROJ_ARTIEF.AEB.

When opened it dropped BKDR_PCCLIEN.bqd which connected to a command and control server through port 8000.

“Here at TrendLabs, the death of a globally known person has become an automatic trigger for us to look for attacks trying to taking advantage in order to protect our customers who are trying to look for more information. Such events generate global interest in a very short amount of time, so they make very good social engineering lures.”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Kim Jong-il malware circulating
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 316

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 121

Vote