|
Online Miscreants Swept Away by Obamania |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : In previous blog postings, I talked about politically themed online malicious activity, focusing on what we observed during the recent U.S. presidential election cycle. Even though the election itself has long since been over, we are continuing to see similar political themes in today s attacks. As anticipation builds around President Elect Barack Obama s upcoming inauguration ceremony, Symantec s Threat Intelligence team analyzed a new wave of malicious spam messages with a Presidential theme that found their way into one of our vast number of global sensors. The corresponding emails have subjects and bodies similar to the following Subject You must look at this Our new president has gone Yours truly, Dan Harrison --- Subject Breaking news Barack Obama refused to be the president of the United States of America Yours Sincerely, Cecily Lynn --- Subject Breaking news There is no president in the USA anymore With kind regards, Edgar Rouse --- Subject What is going on with our country Obama has gone Yours faithfully, Rodney Lynch Each email also contains a hyperlink retracted above for safety reasons that, when clicked on, leads the user to the following Web page While the page looks strikingly similar to the official Obama-Biden campaign site, it is actually vastly different. The site first attempts to exploit weaknesses in your Web browser to surreptitiously install malicious software onto your machine. However, even if your machine is fully patched, the site hopes that your curiosity will get the better of you and every hyperlink on the site points to malicious content. The files you can download from the site take on a variety of names such as usa.exe, obamanew.exe, pdf.exe, statement.exe, barackblog.exe, and barackspeech.exe. Don t let the myriad of names fool you under the hood, the files are all otherwise identical. Rest assured that we detect this piece of malicious software under the name W32.Waledac. This particular piece of malware is capable, among other things, of harvesting sensitive information on your computer turning your machine into a spam zombie establishing a back door on your computer that will allow it to be remotely accessed Interestingly enough, this same piece of malicious software made the rounds not that long ago using various types of Christmas-related themes to trick its way onto your computer. This threat continues to demonstrate a well established practice among today s attackers namely, to trick you into infecting yourself through the use of enticing messages based on current events. Political themes play an especially prominent role in today s online attacks because of their strong appeal among a wide audience. The one thing we can be certain of is that this particular incident is neither isolated nor likely to be the last one we see like it. As we await what will be a truly historic presidential inauguration ceremony, don t let your online safety and sensitive data become history as well Message Edited by Trevor Mack on 01-19-2009 07 54 AM
Les derniers articles du site "Symantec Connect Security Response Billets" :
- What you need to know about election apps and your personal data - Microsoft Patch Tuesday April 2016 - New Adobe Flash Player exploit used by Magnitude and Nuclear exploit kits - Latest Intelligence for March 2016 - New Flash zero-day exploited by attackers in the wild - Samsam may signal a new trend of targeted ransomware - Four tax scams to watch out for this tax season - Most prevalent Android ransomware in the West arrives in Japan - Taiwan targeted with new cyberespionage back door Trojan - Seven Iranians charged in relation to cyberattacks against US
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|