News
News
10/30/2007
02:52 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
Repost This

Cybercriminal Bets Users Will Trade Security For Sex

Trend Micro says new malware is tempting computer users to enter CAPTCHA codes to remove clothing from the image of a model.

The author of a new Trojan is betting that e-mail users will trade security for sex.

According to security company Trend Micro, new malware is tempting computer users to enter CAPTCHA codes -- the images of letters and numbers used to separate humans from bots -- to remove clothing from the image of a model.

"A nifty little program that Trend Micro detects as TROJ_CAPTCHAR.A disguises itself as a strip-tease game, wherein a scantily clad 'Melissa' agrees to take off a little bit of her clothing," said security researcher Roderick Ordonez on the Trend Micro blog. "However, for her to strut her stuff, users must identify the letters hidden within a CAPTCHA. Input the letters correctly, press 'go,' and 'Melissa' reveals more of herself."

But the CAPTCHA characters that users provide are used to subvert security measures at other Web sites.

Ordonez said that the CAPTCHAs analyzed by Trend Micro were taken from Yahoo's Web site. He speculates that the person or persons behind this may be building a large base of Yahoo accounts, possibly for spamming.

Ordonez notes that this represents a new social engineering technique, but others have observed similar tactics in the past.

In early 2005, a product marketing director at Sendmail said that spammers were getting around challenge-response e-mail systems -- which protect users from spam by asking the sender to respond to a challenge question before delivering the sender's message -- by posting challenge questions on porn sites and offering access to porn in return for an answer to the challenge question, which results in the spam being delivered.

Comment  | 
Print  | 
More Insights
The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government, May 2014
Protecting Critical Infrastructure: A New Approach NIST's cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work?
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.