ID Thieves Dupe Users With Saddam Execution Video - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
1/8/2007
12:55 PM
50%
50%
RELATED EVENTS
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

ID Thieves Dupe Users With Saddam Execution Video

F-Secure has tracked three different pieces of malware that use a Saddam theme to download a spyware keylogger that steals online bank account passwords.

Trojan horses piggybacked on messages that claim to include video clips of Saddam Hussein's execution are circulating, Finnish security company F-Secure said Monday. The tactic is typical of hustlers and cybercriminals, said F-Secure, which called the appearance of the malicious Hussein spam "a non-surprising move."

So far, F-Secure has tracked three different pieces of malware that use a Saddam theme. Two of them—Banload.bsw and Banload.bsx—try to disguise themselves by opening a YouTube search result page that shows hits from a keyword in Portuguese: "enforcado" (execution). All three exploits are in fact Trojans that download a spyware keylogger that steals online bank account passwords.

Hussein has been invoked several times by scammers in the past. Nearly two years ago, spam said to include pictures of Saddam after he'd supposedly been shot dead while trying to escape U.S. custody actually harbored the Bobax.h worm. Shortly after that, Nigerian fraudsters tried to dupe recipients into parting with their money by offering a share of the private fortunes of Hussein and his closest aids.

Video of Hussein's execution was captured on a cell phone and widely distributed on the Internet and via mobile networks after the former Iraqi dictator's hanging on Dec. 30.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll