iTnews

Angelina Jolie pictures trigger malware surge

By Fiona Raisbeck on Oct 2, 2007 10:01AM
Angelina Jolie pictures trigger malware surge

Emails posing as nude pictures of the actress Angelina Jolie have been blamed for a surge in malware last month, according to Sophos.

The jump is attributed to a hacking campaign using the Pushdo Trojan during the second half of September.

Messages promising images of actresses such as Halle Berry and Jolie, were sent to recipients with malware designed to give the hackers control of infected computers.

According to Sophos, the Pushdo Trojan accounted for nearly four in every five malicious emails during a single 24-hour period last month.

"The Pushdo Trojan has been spammed out every Wednesday since March 2007 using a variety of enticing disguises,” said Carole Theriault, senior security consultant at Sophos. “But lately, the cyber criminals have stepped up a gear and have begun to spam innocent computer users at any time and on any day of the week."

The figures reveal that one in every 833 emails were infected with a malicious attachment compared to one in every 1,000 during August and Sophos detected 5,400 new webpages hosting malicious code each day last month.


Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
angelinajoliemalwarepicturessecuritysurgetrigger

Partner Content

Operationalising net zero to be centre stage at IoT Impact conference
Partner Content Operationalising net zero to be centre stage at IoT Impact conference
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Matt Tett to lead essential primer session on security by design
Partner Content Matt Tett to lead essential primer session on security by design
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Fiona Raisbeck
Oct 2 2007
10:01AM
0 Comments

Related Articles

  • Google adds phishing protection to Workspace apps
  • FBI Cyclops Blink operation disinfected thousands of WatchGuard appliances
  • Misconfigured VPN behind destructive Viasat attack
  • Sandworm crafts malware to run on ASUS routers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

What to expect from the incoming Labor government

What to expect from the incoming Labor government

Digital Nation

Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.