Spyware Goons Exploit Benazir Bhutto's Death
Think CNN and the major network news agencies are the only ones quick to jump on breaking international events?
Think again.
Only hours after the tragic announcement of the assassination of former Pakistani Prime Minister Benazir Bhutto, malware creators had already crafted an exploit to take advantage of curious web users.
A number of security companies are reporting the widespread exploit, including McAfee, Symantec, and WebSense. According to this group, at least ten sites on Blogger.com (Google's primary blog service) were, as of the day of Bhutto's assassination, spreading a fake video codec that duped users into clicking. (Source: securitypronews.com)
Although the events are new, the tactic is not. It uses a time-honored malware goon tradition, whereby a promised video suddenly demands a forged 'update' in order to display. In this case, it was video covering Bhutto's untimely passing, with a "high-definition video codec" required for users hoping to view the illicit clip.
Of course, there's no HD bonus. Instead, users download a self-executing .EXE file ("video codec") that pumps their computer full of the Zlob Trojan horse: an exploit that helps hackers exploit a PC with any number of other malware programs.
Some Symantec researchers see this kind of activity as 'robbing the dead.' "Even death isn't sacred to some," said one Symantec researcher.
In some other cases, those interested in Bhutto's assassination are being made vulnerable to what are called 'drive-by attacks' by hackers. According to a McAfee security analyst, "There are a plethora of sites which attempt drive-by installations when unsuspecting users visit search-engine results for 'Benazir Bhutto.'" Many pages include malicious scripts that contain dangerous variants of the MS06-014 exploit, which McAfee say "is perhaps one of the most popular of all the exploits we see on a daily basis." (Source: computerworld.com)
These kinds of exploits aren't even limited to stunning world events, as in the case of Bhutto. Not long ago, fans of singer Alicia Keyes were hit by a fake codec when visiting her MySpace page.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.