European Storms Spawn Short-lived Trojan Spam Strike - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
1/19/2007
01:02 PM
50%
50%

European Storms Spawn Short-lived Trojan Spam Strike

Around midnight Thursday London time, security vendors monitored a massive spike in infections. At one point, the spam accounted for 1 of every 200 e-mails sent using the Internet.

News of the severe storms still wracking Europe was used early Friday as fodder for a massive spam run that included a dangerous Trojan horse, security companies said.

The message comes with the subject head "230 dead as storm batters Europe," and includes an executable file purporting to contain either more details on the bad weather or a video showing its destruction. The Trojan was identified by Sophos as "Troj/DwnLdr-FYD," code that when launched by the user infects his or her PC. The Trojan is able to download additional malicious code to the victimized system that, for example, turns the machine into a spam zombie or mines it for valuable personal information.

Around midnight Thursday London time, Sophos and other security vendors monitored a massive spike in infections caused by the spammed Trojan. At one point, the spam accounted for of 1 of every 200 e-mails sent using the Internet.

"Whoever is behind this spam campaign has generated an aggressive storm of e-mail in the last 12 hours, and some inboxes will be feeling battered by the deluge, said Graham Cluley, a Sophos technology consultant, in a statement. "Hackers are deliberately exploiting public interest in breaking news stories like this in their attempt to silently infect innocent users' PCs."

Using news of high-profile disasters to dupe users into opening attachments is nothing new. Within weeks of the December 2004 earthquake and tsunami in south Asia, hackers were tying malware to messages of the humanitarian crisis in the region. Similar campaigns were waged by cyber criminals after the Katrina hurricane and the London terrorist bombings of 2005.

Most of those attacks, however, were launched days after the event; Friday's was within hours of the storms hitting Europe on Thursday with hurricane-force winds and heavy rainfall.

Friday's spammed attack tapered off about eight hours after it began, Finnish security company F-Secure said in a video statement from its nerve center. "But as you can see, the reach was far."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll