It's BBC's turn to be spoofed by trojans to spread
Security experts have warned users about the emergence of a new type of Trojan that spreads strongly via email.
The distribution of the trojan is to send emails to fake BBC News with the content that former Italian Prime Minister Silvio Berlusconi has been assassinated by terrorists. These emails are often titled " Berlusconi la morte, Berlusconi di terrorismo, Berlusconi Tragedia, and Berlusconi di omicidio ".
Attach the emails to the " necfotos.zip " file - which contains a photo of former Prime Minister Berlusconi (silvio01.gif) and a malicious PIF file hiding the Dloadr-ALM trojan.
All of the above messages are fake from bbc.italy2006@bbc.com .
Sophos Graham Cluley's senior technology consultant confirmed that the information sent was completely false. Berlusconi, the former prime minister, is still very healthy. The truth is that these emails only want to trick users into opening attachments to it. But that is a way to activate the attached trojan to infect the user's system. Once infected, it will download more malicious software.
" Hackers are increasingly inclined to exploit user interest in political issues, ongoing problems and hot news to spread malware. Anybody is not careful. "Opened attachments with email will face the risk of their own systems falling into the hands of hackers. Their personal information will be taken away, " Cluley said.
" The latest attack is targeted at users in Italy, but it can spread further in the future, " Cluley said.
Hoang Dung
You should read it
- What is Trojan Dropper?
- The Japanese security minister admitted never using a computer
- Again Trojan appeared to attack Mac OS
- Appeared Trojans spy on businesses
- The fake Trojan add-on Trojan is extremely dangerous
- Appeared trojan trojan antivirus tool for mobile
- Microsoft warned the Emotet trojan back on a large scale, stealing the victim's banking information
- Carefully stolen information with Trojan - How to disable Trojan
May be interested
- The impact of Spyware on Enterprisesdid you know that recently a trojan horse program has been developed for use in industrial intelligence operations? it is used for unlawful purposes, detecting the number of computers of leading and large companies
- Sneaking malware on the Internetmalware, the common name for annoying malware such as adware, spyware (trojans, spyware), dangerous codes that control and control remote computers for bad purposes (computer is taken and
- Add a computer worm taking advantage of the error MS06-040yesterday, symatec warned of a new computer worm targeting the security bug ms06-040 that appeared on the internet. new computer worm - named 'randex.gel' - belongs to the line
- Trojans hide themselves under SPAM pornsecurity experts claim that the main goal of this attack by cyber criminals is to trick recipients into downloading malicious software to help them control the system or steal personal information. their secret.
- 90% of computers infected with spyware ?!webroot software (www.webroot.com), an antispyware software company has just announced their research, whereby the level of spyware infection is at its highest level ever.
- Appeared worm computer attack AMD processor chipsymantec's security researchers have discovered a computer worm that can directly attack amd processors, instead of attacking windows operating systems. with two different versions, the worm type