Phishing campaign downs US-CERT email

Powered by SC Magazine
 

Attackers target US Government, private sector organisations.

A large phishing campaign has spoofed US-CERT and hindered the organisation's ability to handle email.

The Computer Emergency Response Team, which operates in the US Department of Homeland Security, issued a warning to internet users after the phishing email campaign emerged yesterday.

Attackers had spoofed US-CERT email addresses to target "a large number of private sector organisations as well as federal, state, and local governments".

An operator at US-CERT said it had difficulty receiving emails due to the phishing campaign.

The phishing emails have an attached .zip file that contains a malicious executable called "US-CERT Operation Center Reports" .eml.exe".

The emails were entitled "Phishing incident report" and included a phone number. The address soc@us-cert.gov was the primary spoofed address but US-CERT notes other invalid email addresses were also used.

It advised that users do not open the email or attachments.

The attack follows a concerted phishing campaign allegedly from China that sent files infected with Microsoft and Adobe vulnerabilities to US organisations.

Once executed, infected machines would display public information about US unmanned aerial support vehicles, according to Alienvault analyst Jamie Blasco.

Copyright © SC Magazine, Australia


Phishing campaign downs US-CERT email
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1120

Vote