‘Clinton Deal IS Leader caught on Video’ emails are fake, contain Trojan: Symantec

The email sent by cyber criminals has “Clinton Deal IS Leader caught on Video” in the subject. But Symantec says that the email does not have a video but contains Adwind cross-platform remote access Trojan.

Cybercriminals are using a non-existent video that claims to show Democratic Party presidential nominee Hillary Clinton exchanging money with an Islamic State (IS) leader to distribute malicious spam emails. The email’s subject announces “Clinton Deal IS Leader caught on Video”. However there is no video in the email. Instead the email contains Adwind cross-platform remote access Trojan, global cyber security leader Symantec alerted. The email also discusses voting and asks recipients to “decide on who to vote [for]” after watching the non-existent clip.

The spam email signs off with the name of an unknown group called “Lets Save America” and it also contains a hashtag which reads #letssaveUSA. If the attached malware to the email gets executed, the recipient is infected with a Java remote access Trojan (RAT) that Symantec detects as Backdoor.Adwind. It also drops a Visual Basic Script (VBS) file that allows the malware to determine which antivirus and firewall software is running on the compromised computer. The Adwind RAT is multi-functional and cross-platform, making it possible to infect Windows, Mac, Linux and Android operating systems.

A recent report by multinational computer technology company Dell on Saturday warned that cyber crime increased significantly around the world in 2015 despite organizations deploying end-to-end security solutions perfectly. Cyber criminals employed a number of new tactics to better conceal exploit kits from security systems including the use of anti-forensic mechanisms and URL pattern changes, the company said in its “Security Annual Threat Report”.

Modifications in landing page entrapment techniques; steganography which is concealing the file, message, image, or video within another file, message, image, or video, and modifications in landing page entrapment techniques, were also used effectively to compromise the security, it added.

Source: bgr.in

#Amazon #Android #Apple #Asus #camera #Galaxy #Google #Games #iPad #iPhone #Lenovo #Lumia #Laptop #Microsoft #Moto #Motorola #news #Nexus #Note #OnePlus #phone #Plus #Releases #review #Samsung #smartphone #Sony #Watch #Windows #Xiaomi #Xperia



Top Brands

No Comments

    Leave a reply