Friday, October 24, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
HP Broadens Moonshot Portfolio With Intel-powered Models
Microsoft To Keep Nokia Brand For Low-end Smartphones
LG Introduces Its First Octa-Core Application Processor
Cloud and Surface 3 Drive Microsoft's Revenue
Micron Urges Investors To Reject TRC Capital's Unsolicited Tender Offer
Facebook Returns To Chat Roots With Rooms App
Sony SmartWatch 3 And LG G Watch R Are Rolling Out With Updated Android Wear Software
New Nvidia Driver Enable DSR On Older Graphics Cards
Active Discussions
Copied dvd's say blank in computer only
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
 Home > News > General Computing > Spam Ca...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, December 09, 2010
Spam Carries WikiLeaks Worm


Wikileaks.org is in the news after their recent publications linked to leaked government documents. Spammers are now leveraging the current level of interest with social engineering techniques to infect users? computers.

Symantec observed a wave of spam spoofing WikiLeaks to lure users into becoming infected with a new threat.

The spam email has subject line "IRAN Nuclear BOMB!" and spoofed headers. The "From" header purports to originate from Wikileaks.org, although this is not in fact the case, and the message body contains a URL. This URL downloads and runs Wikileaks.jar which has a downloader 'Wikileaks.class' file. The downloader pulls the threat from http://ugo.file[removed].com/226.exe. Symantec detects this threat as W32.Spyrat.

Below is screenshot of the email and website that downloads the threat:



W32.Spyrat opens a backdoor using a predetermined port and IP address, allowing an attacker to perform the following actions on the compromised computer:

* Read, write, and execute files
* Steal stored passwords
* Issue commands
* Activate and view a webcam, if present
* Log keystrokes
* Create an HTTP proxy to route traffic through the compromised computer

Symantec cautions users not to open or click on the links or attachments of emails such as these. The company recommends having anti-spam and antivirus solutions installed and up to date to prevent the compromise of personal machines or networks.


Previous
Next
Renesas Develops the Basic Structure for Embedded DRAM with High Compatibility with Standard CMOS Logic Circuits        All News        Fujitsu Device Generates Electricity from Heat and Light
Dell In Talks to Buy Compellent     General Computing News      Fujitsu Device Generates Electricity from Heat and Light

Get RSS feed Easy Print E-Mail this Message

Related News
Dropbox, WordPress Used To Spread Malware
Microsoft Says Viruses Are Back On The Rise
First Targeted Attack Utilising Malware for Android Devices Reported
Cyber Attack Targets Nato, Government Websites
Stuxnet Roots Found Back in 2005
Java Exploit Behind "Red October" Cyber Attacks
FTC Warns Small Businesses Of Spam Email
Kaspersky Says 'Red October' Virus Has Been Targeting Diplomatic and Government Agencies
Kaspersky Discovers New version Of Flams Virus
Microsoft Warns Of New IE Security Breach
Microsoft Disrupts Nitol Botnet
Kaspersky Discovers New IT Virus Linked To Stuxnet

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .