SlideShare a Scribd company logo
1 of 1
Download to read offline
BitDefender




              Angelina Angelina Jolie,
              Britney Spears and Barack Obama
              Comprise BitDefender’s Trojan of the
              Week
              Spammers continuing to use sensationalized headlines to lure unsuspecting computer users




              A new malware distribution scheme performed via spam messages aimed at tricking computer users to download
              and install malicious applications on their computers has been identified by BitDefender®, an award-winning
              provider of antivirus software and data security solutions, today.

              : http://www.bitdefender.com/files/News/img/player.jpg: http://www.bitdefender.com/files/News/img/player.jpg


              : http://www.bitdefender.com/files/News/img/spam_message.jpg:
              http://www.bitdefender.com/files/News/img/spam_message.jpg



              The malware distribution campaign is based on news fragments involving Angelina Jolie, Britney Spears and
              Barack Obama. The e-mail messages direct unsuspecting users to a webpage that allegedly contains a video clip.
              However, upon visiting the compromised page, they are shown an image impersonating a video player, linking
              to a binary executable file.

              In order to be able to watch the clip, users are advised to download an alleged update for Adobe’s popular Flash
              player, which turns to be infected with Trojan.Downloader.Tibs.GZM. Additionally, the binary file starts
              downloading automatically, a practice known as “drive-by download”, and this should be enough of a warning
              for the user about the file’s legitimacy. When executed, the Trojan installs other pieces of malware, including the
              infamous Trojan.Peed.JPU, used on large scale in the Storm botnet.

              The new mail distribution campaign mostly targets computer users with limited knowledge of data security, as
              well as users who would deliberately ignore the common safety rules in order to gain access to sensational news.

               “These e-mail messages are part of a larger wave that attempts to infect the user with miscellaneous Trojans,”
              said Bogdan Dumitru, BitDefender’s chief technology officer. “Initially designed as messages with a single
              structure, the number of variants quickly escalated to three: a category including a single-part, plain text body,
              another one with a HTML part, and a third category that uses the Opera Mail Client templates.”

              : http://www.bitdefender.com/files/News/img/tibs.jpg: http://www.bitdefender.com/files/News/img/tibs.jpg



              In order to increase the success rate of the attack, the spammer uses a series of catchy keywords that are
              displayed alternatively inside the message body. Despite the fact that each message uses different fake news
              flashes and headlines, all of them send the user to an URL that ends with either stream.html or watchit.html.

              Although the approach is extremely similar to a previous spam campaign involving Angelina Jolie and Michael
              Jackson, the pieces of malware and their hosting servers have been changed. The new Trojan has been repacked
              with another utility in order to avoid detection.

              BitDefender’s professional security solutions are currently filtering and detecting both the spam message and the
              malicious code the „install_flash_player_update” binary is infected with (Trojan.Downloader.Tibs.GZM). In
              order to enjoy a safe experience while surfing the web, BitDefender recommends that users install a complete
              anti-malware protection solution.

More Related Content

What's hot

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 

What's hot (18)

Iloveyou virus
Iloveyou virusIloveyou virus
Iloveyou virus
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Ransomware History and Monitoring Tips
Ransomware History and Monitoring TipsRansomware History and Monitoring Tips
Ransomware History and Monitoring Tips
 
Today's malware aint what you think
Today's malware aint what you thinkToday's malware aint what you think
Today's malware aint what you think
 
Computer virus
Computer virusComputer virus
Computer virus
 
Software piracy
Software piracySoftware piracy
Software piracy
 
I Love You =D
I Love You =DI Love You =D
I Love You =D
 
Unit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurityUnit+four+ +principles+of+cybersecurity
Unit+four+ +principles+of+cybersecurity
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskar
 
Malware
MalwareMalware
Malware
 
Types of computer viruses
Types of computer viruses Types of computer viruses
Types of computer viruses
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safety
 
Computer virus
Computer virusComputer virus
Computer virus
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Virus
VirusVirus
Virus
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 

Viewers also liked (7)

Tekort Aan Kraamverzorgenden 4
Tekort Aan Kraamverzorgenden 4Tekort Aan Kraamverzorgenden 4
Tekort Aan Kraamverzorgenden 4
 
Tankd Thursdays Front1
Tankd Thursdays Front1Tankd Thursdays Front1
Tankd Thursdays Front1
 
Aluno Adm 1 2009 260309
Aluno Adm 1 2009 260309Aluno Adm 1 2009 260309
Aluno Adm 1 2009 260309
 
national oilwell varco Fourth Quarter 2008 Segmented Financial Data
national oilwell varco Fourth Quarter 2008 Segmented Financial Datanational oilwell varco Fourth Quarter 2008 Segmented Financial Data
national oilwell varco Fourth Quarter 2008 Segmented Financial Data
 
yrc worldwide1Q07_stats_3
yrc worldwide1Q07_stats_3yrc worldwide1Q07_stats_3
yrc worldwide1Q07_stats_3
 
usg SI_2001
usg SI_2001usg SI_2001
usg SI_2001
 
Become Your Hero
Become Your HeroBecome Your Hero
Become Your Hero
 

Similar to 787

When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
STO STRATEGY
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
Aleksandr Yampolskiy
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
Mangesh wadibhasme
 

Similar to 787 (20)

Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
Conficker
ConfickerConficker
Conficker
 
C3
C3C3
C3
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Information security
Information securityInformation security
Information security
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Newsbytes april2013
Newsbytes april2013Newsbytes april2013
Newsbytes april2013
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014RSA Monthly Online Fraud Report -- June 2014
RSA Monthly Online Fraud Report -- June 2014
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud Landscape
 
The CCleaner Infection
The CCleaner InfectionThe CCleaner Infection
The CCleaner Infection
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
File000145
File000145File000145
File000145
 

More from Uskidz

adcampaignrelease
adcampaignreleaseadcampaignrelease
adcampaignrelease
Uskidz
 
event_clips
event_clipsevent_clips
event_clips
Uskidz
 
MLDVProgramList_premium
MLDVProgramList_premiumMLDVProgramList_premium
MLDVProgramList_premium
Uskidz
 
NVG9702
NVG9702NVG9702
NVG9702
Uskidz
 
ClimateChampionsReportJuly07
ClimateChampionsReportJuly07ClimateChampionsReportJuly07
ClimateChampionsReportJuly07
Uskidz
 
spring_2008
spring_2008spring_2008
spring_2008
Uskidz
 
artic_02
artic_02artic_02
artic_02
Uskidz
 
WB2U11
WB2U11WB2U11
WB2U11
Uskidz
 
061127
061127061127
061127
Uskidz
 
pagea8
pagea8pagea8
pagea8
Uskidz
 
newsletter_issue_2
newsletter_issue_2newsletter_issue_2
newsletter_issue_2
Uskidz
 
NALIP-PressRelease-0710
NALIP-PressRelease-0710NALIP-PressRelease-0710
NALIP-PressRelease-0710
Uskidz
 
programa_foro-latino
programa_foro-latinoprograma_foro-latino
programa_foro-latino
Uskidz
 
howto_uncertainty
howto_uncertaintyhowto_uncertainty
howto_uncertainty
Uskidz
 
133_UNR
133_UNR133_UNR
133_UNR
Uskidz
 
MexicanPrsrls
MexicanPrsrlsMexicanPrsrls
MexicanPrsrls
Uskidz
 
4hispanosMatamoscasChicano
4hispanosMatamoscasChicano4hispanosMatamoscasChicano
4hispanosMatamoscasChicano
Uskidz
 
Vogue_06_2005
Vogue_06_2005Vogue_06_2005
Vogue_06_2005
Uskidz
 
Morningstar
MorningstarMorningstar
Morningstar
Uskidz
 

More from Uskidz (20)

adcampaignrelease
adcampaignreleaseadcampaignrelease
adcampaignrelease
 
event_clips
event_clipsevent_clips
event_clips
 
MLDVProgramList_premium
MLDVProgramList_premiumMLDVProgramList_premium
MLDVProgramList_premium
 
NVG9702
NVG9702NVG9702
NVG9702
 
Frida
FridaFrida
Frida
 
ClimateChampionsReportJuly07
ClimateChampionsReportJuly07ClimateChampionsReportJuly07
ClimateChampionsReportJuly07
 
spring_2008
spring_2008spring_2008
spring_2008
 
artic_02
artic_02artic_02
artic_02
 
WB2U11
WB2U11WB2U11
WB2U11
 
061127
061127061127
061127
 
pagea8
pagea8pagea8
pagea8
 
newsletter_issue_2
newsletter_issue_2newsletter_issue_2
newsletter_issue_2
 
NALIP-PressRelease-0710
NALIP-PressRelease-0710NALIP-PressRelease-0710
NALIP-PressRelease-0710
 
programa_foro-latino
programa_foro-latinoprograma_foro-latino
programa_foro-latino
 
howto_uncertainty
howto_uncertaintyhowto_uncertainty
howto_uncertainty
 
133_UNR
133_UNR133_UNR
133_UNR
 
MexicanPrsrls
MexicanPrsrlsMexicanPrsrls
MexicanPrsrls
 
4hispanosMatamoscasChicano
4hispanosMatamoscasChicano4hispanosMatamoscasChicano
4hispanosMatamoscasChicano
 
Vogue_06_2005
Vogue_06_2005Vogue_06_2005
Vogue_06_2005
 
Morningstar
MorningstarMorningstar
Morningstar
 

Recently uploaded

Plant cell organelles Poster in green white blue illustrative style.pdf
Plant cell organelles Poster in green white blue illustrative style.pdfPlant cell organelles Poster in green white blue illustrative style.pdf
Plant cell organelles Poster in green white blue illustrative style.pdf
Roger Garcia
 
week 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptxweek 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptx
joshuaclack73
 
成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书
成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书
成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书
ytuknae
 
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
ahafux
 
batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01
Patricia Pham
 
Title Unlocking Imagination The Importance of Toca Boca for Kids.pdf
Title Unlocking Imagination The Importance of Toca Boca for Kids.pdfTitle Unlocking Imagination The Importance of Toca Boca for Kids.pdf
Title Unlocking Imagination The Importance of Toca Boca for Kids.pdf
Toca boca
 
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
Marwah Studios
 

Recently uploaded (17)

Plant cell organelles Poster in green white blue illustrative style.pdf
Plant cell organelles Poster in green white blue illustrative style.pdfPlant cell organelles Poster in green white blue illustrative style.pdf
Plant cell organelles Poster in green white blue illustrative style.pdf
 
WHO KILLED ALASKA? #17: Mirror Memoria - "OFFICER" TRANSCRIPT.pdf
WHO KILLED ALASKA? #17: Mirror Memoria - "OFFICER" TRANSCRIPT.pdfWHO KILLED ALASKA? #17: Mirror Memoria - "OFFICER" TRANSCRIPT.pdf
WHO KILLED ALASKA? #17: Mirror Memoria - "OFFICER" TRANSCRIPT.pdf
 
Vibration Control.pptxjjjjjjjjjjjjjjjjjjjjj
Vibration Control.pptxjjjjjjjjjjjjjjjjjjjjjVibration Control.pptxjjjjjjjjjjjjjjjjjjjjj
Vibration Control.pptxjjjjjjjjjjjjjjjjjjjjj
 
week 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptxweek 3 questions and answers.phhhhhhhhhhptx
week 3 questions and answers.phhhhhhhhhhptx
 
WHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdf
WHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdfWHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdf
WHO KILLED ALASKA? #15: "5½ STORIES Part Two" Transcript .pdf
 
the red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdointhe red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdoin
 
NO1 Pakistan kala jadu Specialist Expert in Quetta, Gujranwala, muzaffarabad,...
NO1 Pakistan kala jadu Specialist Expert in Quetta, Gujranwala, muzaffarabad,...NO1 Pakistan kala jadu Specialist Expert in Quetta, Gujranwala, muzaffarabad,...
NO1 Pakistan kala jadu Specialist Expert in Quetta, Gujranwala, muzaffarabad,...
 
成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书
成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书
成绩单不见怎么办:买宾州州立大学毕业证成绩单学历证书
 
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
在线办理(concordia学位证书)康考迪亚大学毕业证学历学位证书学费发票原版一模一样
 
batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01
 
WHO KILLED ALASKA? #18: Mirror Memoria - "TATTOO" TRANSCRIPT.pdf
WHO KILLED ALASKA? #18: Mirror Memoria - "TATTOO" TRANSCRIPT.pdfWHO KILLED ALASKA? #18: Mirror Memoria - "TATTOO" TRANSCRIPT.pdf
WHO KILLED ALASKA? #18: Mirror Memoria - "TATTOO" TRANSCRIPT.pdf
 
C&C Artists' Websites .
C&C Artists' Websites                       .C&C Artists' Websites                       .
C&C Artists' Websites .
 
kiff2
kiff2kiff2
kiff2
 
Title Unlocking Imagination The Importance of Toca Boca for Kids.pdf
Title Unlocking Imagination The Importance of Toca Boca for Kids.pdfTitle Unlocking Imagination The Importance of Toca Boca for Kids.pdf
Title Unlocking Imagination The Importance of Toca Boca for Kids.pdf
 
The Gaming Quiz - 17th April 2024, Quiz Club NITW
The Gaming Quiz - 17th April 2024,  Quiz Club NITWThe Gaming Quiz - 17th April 2024,  Quiz Club NITW
The Gaming Quiz - 17th April 2024, Quiz Club NITW
 
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
8th Global Fashion and Design Week Noida 2024 Sets New Standards in Creative ...
 
Smart-Dustbin-Using-EEEEEEESP32 (1).pptx
Smart-Dustbin-Using-EEEEEEESP32 (1).pptxSmart-Dustbin-Using-EEEEEEESP32 (1).pptx
Smart-Dustbin-Using-EEEEEEESP32 (1).pptx
 

787

  • 1. BitDefender Angelina Angelina Jolie, Britney Spears and Barack Obama Comprise BitDefender’s Trojan of the Week Spammers continuing to use sensationalized headlines to lure unsuspecting computer users A new malware distribution scheme performed via spam messages aimed at tricking computer users to download and install malicious applications on their computers has been identified by BitDefender®, an award-winning provider of antivirus software and data security solutions, today. : http://www.bitdefender.com/files/News/img/player.jpg: http://www.bitdefender.com/files/News/img/player.jpg : http://www.bitdefender.com/files/News/img/spam_message.jpg: http://www.bitdefender.com/files/News/img/spam_message.jpg The malware distribution campaign is based on news fragments involving Angelina Jolie, Britney Spears and Barack Obama. The e-mail messages direct unsuspecting users to a webpage that allegedly contains a video clip. However, upon visiting the compromised page, they are shown an image impersonating a video player, linking to a binary executable file. In order to be able to watch the clip, users are advised to download an alleged update for Adobe’s popular Flash player, which turns to be infected with Trojan.Downloader.Tibs.GZM. Additionally, the binary file starts downloading automatically, a practice known as “drive-by download”, and this should be enough of a warning for the user about the file’s legitimacy. When executed, the Trojan installs other pieces of malware, including the infamous Trojan.Peed.JPU, used on large scale in the Storm botnet. The new mail distribution campaign mostly targets computer users with limited knowledge of data security, as well as users who would deliberately ignore the common safety rules in order to gain access to sensational news. “These e-mail messages are part of a larger wave that attempts to infect the user with miscellaneous Trojans,” said Bogdan Dumitru, BitDefender’s chief technology officer. “Initially designed as messages with a single structure, the number of variants quickly escalated to three: a category including a single-part, plain text body, another one with a HTML part, and a third category that uses the Opera Mail Client templates.” : http://www.bitdefender.com/files/News/img/tibs.jpg: http://www.bitdefender.com/files/News/img/tibs.jpg In order to increase the success rate of the attack, the spammer uses a series of catchy keywords that are displayed alternatively inside the message body. Despite the fact that each message uses different fake news flashes and headlines, all of them send the user to an URL that ends with either stream.html or watchit.html. Although the approach is extremely similar to a previous spam campaign involving Angelina Jolie and Michael Jackson, the pieces of malware and their hosting servers have been changed. The new Trojan has been repacked with another utility in order to avoid detection. BitDefender’s professional security solutions are currently filtering and detecting both the spam message and the malicious code the „install_flash_player_update” binary is infected with (Trojan.Downloader.Tibs.GZM). In order to enjoy a safe experience while surfing the web, BitDefender recommends that users install a complete anti-malware protection solution.