Malware spam promises Virginia Tech video

Powered by SC Magazine
 

Hackers have begun cashing in on the Virginia Tech university tragedy by spamming out malware-infected emails.

Hackers have begun cashing in on the Virginia Tech university tragedy by spamming out malware-infected emails purporting to offer cameraphone footage of the attack which resulted in more than 30 deaths.

Email messages carry a photograph of gunman Cho Seung Hui and claim to link to a Brazilian movie website carrying footage of the campus shootings. 

But clicking on the link downloads a malicious screensaver file which installs a banking spyware Trojan.

The Trojan attempts to steal passwords, usernames and other information from online bank users, opening the possibility for identity theft and allowing bank accounts to be raided by cyber-criminals.

"It is pretty sick that cyber-criminals use tragic events like this in their attempts to make cash, but sadly it is not the first time and unlikely to be the last," said Graham Cluley, senior technology consultant for Sophos.

"It is of paramount importance that everyone treats unsolicited emails with suspicion, and thinks twice before they run a unsolicited program or click on a link.

"Regular antivirus updates, firewalls, security patches and a good serving of common sense is a must."

Past malware and spam campaigns have taken advantage of headline breaking news stories such as Hurricane Katrina, the Indian tsunami and the terror bombings in London.

Copyright ©v3.co.uk


Malware spam promises Virginia Tech video
 
 
 
Top Stories
Business-focused Windows 10 brings back the Start menu
Microsoft skips 9 for the "greatest enterprise platform ever".
 
Feeling Shellshocked?
Stay up to date with patching for the Bash bug.
 
Amazon forced to reboot EC2 to patch Xen bug
Rolling restarts over next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1357

Vote