Hackers have seized on the results of the U.S. presidential election to launch a major malware campaign that tries to trick users into installing an update to Adobe Systems Inc.’s Flash, but actually plants a Trojan horse on unprotected PCs, Computerworld reports. The malware blitz stems from spam messages touting Sen. Barack Obama’s victory Nov. 4, and it offers up a link to what is supposedly a site sporting election results. When users click on the link, however, they’re shunted to a fake site that demands the user install an update to Adobe’s Flash Player before viewing a video. Rather than a Flash update, what’s actually downloaded is a Trojan horse that compromises the PC, then floods the machine with more malware, said Dan Hubbard, vice president of security research at Websense Inc. "This is very coordinated," said Hubbard of the Obama-themed attacks, "with evidence that they planned this, then waited for the election results." According to Hubbard, the hackers registered 15 to 20 domains to host the malware and fake site. All the domains are on so-called "fast flux" servers, Hubbard added, referring to the practice in which criminals rapidly switch domains between multiple IP addresses. Identity thieves often use the fast-flux tactic as a way to stay ahead of the law and prevent their servers from being shut down…

Click here for the full story

About the Author:

eSchool News


Add your opinion to the discussion.