Cybercriminal Bets Users Will Trade Security For Sex - InformationWeek
IoT
IoT
News
News
10/30/2007
02:52 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

Cybercriminal Bets Users Will Trade Security For Sex

Trend Micro says new malware is tempting computer users to enter CAPTCHA codes to remove clothing from the image of a model.

The author of a new Trojan is betting that e-mail users will trade security for sex.

According to security company Trend Micro, new malware is tempting computer users to enter CAPTCHA codes -- the images of letters and numbers used to separate humans from bots -- to remove clothing from the image of a model.

"A nifty little program that Trend Micro detects as TROJ_CAPTCHAR.A disguises itself as a strip-tease game, wherein a scantily clad 'Melissa' agrees to take off a little bit of her clothing," said security researcher Roderick Ordonez on the Trend Micro blog. "However, for her to strut her stuff, users must identify the letters hidden within a CAPTCHA. Input the letters correctly, press 'go,' and 'Melissa' reveals more of herself."

But the CAPTCHA characters that users provide are used to subvert security measures at other Web sites.

Ordonez said that the CAPTCHAs analyzed by Trend Micro were taken from Yahoo's Web site. He speculates that the person or persons behind this may be building a large base of Yahoo accounts, possibly for spamming.

Ordonez notes that this represents a new social engineering technique, but others have observed similar tactics in the past.

In early 2005, a product marketing director at Sendmail said that spammers were getting around challenge-response e-mail systems -- which protect users from spam by asking the sender to respond to a challenge question before delivering the sender's message -- by posting challenge questions on porn sites and offering access to porn in return for an answer to the challenge question, which results in the spam being delivered.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll