Banner2014_01 Home - starting place and general lodge information! Banner2014_03 Go to the Orange Coast District Elks site! Banner2014_05 Go to the CHEA site! Banner2014_07 Go to the Grand Lodge site! Banner2014_09
All American Lodge Winner!
Elks of Orange In Our Community
Join us on Facebook!
Donate to ENF!
Donate to ENF!
Latest Posts:
~~11-03-2024 Welcome Francisco Flores! ~~~~10-30-2024 Welcome  Shana DiDodo! ~~~~10-30-2024 Welcome Shana DiDodo! ~~~~10-28-2024 Welcome Jonathan  St Clair! ~~~~10-27-2024 Welcome Jonathan StClair! ~~

» Welcome Guest
[ Log In :: Register ]

1 members are viewing this topic
>Guest

 

[ Track This Topic :: Email This Topic :: Print this topic ]

reply to topic new topic new poll
Topic: Fake CNN Alert Still Spreading Malware, BEWARE!< Next Oldest | Next Newest >
 Post Number: 1
Doug Wells
Webmaster
Avatar
Posts: 2318
Offline
PostIcon Posted on: Aug. 11 2008,9:23 pm  Skip to the next post in this topic. Ignore posts   QUOTE

QUOTE
The massive attack that has infected PCs by tricking users into clicking links in fake messages from CNN.com shows little sign of ending soon, security researchers say.

According to MX Logic Inc. , spam posing as CNN.com Top 10 lists peaked at close to 11 million messages per hour early Thursday, but remained at high volumes throughout the day Friday. The Colorado security vendor said it had been tracking an average of 8 million messages per hour since midnight.

MX Logic's vice president of information security, Sam Masiello , called the trend "a very slow, but steady decline" from the 11 a.m. Mountain Time peak the day before.

Masiello also said that the spam has changed since attacks were first launched on Tuesday. "We've also seen several morphs of this spam over the past couple of days," he said in an entry posted on the MX Logic blog Friday . Where the messages once trumpeted " CNN .com Daily Top 10" in the subject heading and linked to a single filename on malware-hosting sites, now the spam sports a subject reading "CNN Alerts: My Custom Alert" and uses a variety of filenames in the malicious URL.

"This is likely in response to all of the media attention and awareness that has been brought up over the past couple of days," Masiello speculated.

Also on Friday, Websense Inc. reported that its researchers had seen the attack mutating, with the spam subject heading not only touting "CNN Alerts: My Custom Alert," but also using legitimate news stories culled from CNN to make the messages more convincing.

Users who clicked on the "FULL STORY" link in the message were redirected to a fake CNN site, where they were told they needed to download an update to Flash Player, Adobe System Inc. 's popular Internet media player, to view a video clip from CNN.

Websense also said it had spotted traces of the campaign in blog spam.

If users agreed to download the bogus Flash update, they were trapped in an endless loop, where clicking "Cancel" in the initial dialog produced a second pop-up. Clicking "Cancel" there returned the user to the first pop-up. The only options at that point were for users to shut down the browser or give in and install the malware.

MX Logic added that it had seen the URLs in the spam lead to legitimate domains that had probably been compromised, and named a U.K.-based roofing company as an example.

Earlier this week, Bulgarian security researcher Dancho Danchev had found more than 1,000 compromised domains being used to serve up the fake Flash. In a follow-up e-mail, Danchev said that in most cases, he couldn't find any characteristics shared by the hacked sites, such as all being hosted by a single Internet service provider.

"My assumption is that they took the time and effort to do some reconnaissance of sites which are vulnerable to remote file inclusion, or other type of remotely exploitable flaw within their Web applications that would allow someone to locally host all the malicious files," Danchev said. "I wouldn't be surprised if I find out that someone has basically went through all keylogged Cpanel passwords he obtained through his botnet, or through the access to a botnet that he temporarily rented."

Cpanel, a popular server control panel program, has been targeted by password thieves in the past because of the access those passwords provide to sites.


Beware, this thing is HUGE! :eek My antivirus program has quarantined my inbox and I had to restore it from the prior day's backup. :eek


--------------
Have a great ! :good

Profile CONTACT Search for posts by this member.
 Post Number: 2
Chris Cooper
Past Inner Guard, Inactive Member
Avatar
Posts: 67
Offline
PostIcon Posted on: Aug. 12 2008,10:54 am Skip to the previous post in this topic.  Ignore posts   QUOTE

This explains a lot!

I had not heard this story, but I had noticed that a full 1/2 of my spam e-mails have the "CNN Alerts: My Custom Alerts" subject line.

For the life of me, I could not remember signing-up for these alerts.

Thanks for the update Doug! :good


--------------
- Coop

:beer

Profile CONTACT Search for posts by this member.
1 replies since Aug. 11 2008,9:23 pm < Next Oldest | Next Newest >

[ Track This Topic :: Email This Topic :: Print this topic ]


 
reply to topic new topic new poll


Elks Care - Elks Share


eXTReMe Tracker