In an ironic twist of events, the news about the malicious email campaign that leverages political issues related to Tibet is now being used in a separate campaign resulting to malware infection.
So far, we have encountered two email campaigns using this particular social engineering technique. The first one, according to reports, has a spoofed sender that mimics Alienvault. In the said message, the specific recipients are warned about the malicious campaign reported on the said website. To know more about this incident, users are instructed to click the link included in the message. However, this is a just coy to mislead users to a website that downloads JAVA_RHINO.AE.
The second campaign is disguised as an email from a prominent Tibetan figure based in New York City. It is also a warning email, in which recipients are advised to ignore a certain email circulating using his name. The said spoofed email contains an attachment, a .DOC file named TenTips.doc. Similar to the email sample mentioned above, instead of helping users to avoid threats, it is actually a malicious file detected as TROJ_ARTIEF.FQ. It is an exploit file that targets the RTF Stack Buffer Overflow Vulnerability (CVE-2010-3333) to drop the file BKDR_VISEL.FQ, which performs specific commands coming from a remote user.
Cybercriminals have a lot of social engineering tricks and leveraging on security warnings is just one of these. Previously we have seen other threats posing as warning messages, such as the spammed wall posts that leads to a fake Facebook account verification site. Users who clicked the link end up spamming the same wall post to his/her contacts. There is also spammed messages masked as an email notification from Apple, which lead to a phishing site that tricks users to divulge their iTunes usernames and passwords.
Email messages, unfortunately, are still popular and effective infection vectors in today’s threat landscape. Users must be cautious and not readily click links from email messages, specially those from unknown senders. For those that spoof well-known brands, news organizations, and individuals, users must make it a habit to verify the validity of these messages. Better yet, bookmark credible news sites to check out the latest security news.
Trend Micro protects users from this attack via Trend MicroT Smart Protection NetworkT that detects and deletes all the related malware.
Leave a reply