Malware spam promises Virginia Tech video

Powered by SC Magazine
 

Hackers have begun cashing in on the Virginia Tech university tragedy by spamming out malware-infected emails.

Hackers have begun cashing in on the Virginia Tech university tragedy by spamming out malware-infected emails purporting to offer cameraphone footage of the attack which resulted in more than 30 deaths.

Email messages carry a photograph of gunman Cho Seung Hui and claim to link to a Brazilian movie website carrying footage of the campus shootings. 

But clicking on the link downloads a malicious screensaver file which installs a banking spyware Trojan.

The Trojan attempts to steal passwords, usernames and other information from online bank users, opening the possibility for identity theft and allowing bank accounts to be raided by cyber-criminals.

"It is pretty sick that cyber-criminals use tragic events like this in their attempts to make cash, but sadly it is not the first time and unlikely to be the last," said Graham Cluley, senior technology consultant for Sophos.

"It is of paramount importance that everyone treats unsolicited emails with suspicion, and thinks twice before they run a unsolicited program or click on a link.

"Regular antivirus updates, firewalls, security patches and a good serving of common sense is a must."

Past malware and spam campaigns have taken advantage of headline breaking news stories such as Hurricane Katrina, the Indian tsunami and the terror bombings in London.

Copyright ©v3.co.uk


Malware spam promises Virginia Tech video
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 346

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 144

Vote