|01 Oct 2010||#1|
| || |
Fake LinkedIn e-mails lead to Zeus Trojan
Criminals are using bogus LinkedIn invite e-mails to trick people into clicking on links that lead to the Zeus data-stealing Trojan, a researcher warned today. The malware targets Windows users.
Researchers saw tens of billions of messages related to the attack yesterday, Henry Stern, a senior security researcher at Cisco Systems, told CNET. "There have been some bursts today, but nothing like yesterday," he said. "The botnet responsible for this is still in operation and it's just doing something else right now."
While this attack appears to be abating, people should be wary of any new campaigns that use similar methods.
"This attack is particularly interesting because of its size," Stern said. "It's one of the largest viral campaigns we've seen, and one of the largest that mimics a social network."
In this attack, the e-mails looked like legitimate LinkedIn invites with a Web link for confirming a contact. However, the link doesn't lead to LinkedIn; it redirects to a Web page and displays a message saying "Please waiting .... 4 seconds" before then redirecting to Google.
Fake LinkedIn e-mails lead to Zeus Trojan | Security - CNET News
|My System Specs|
|Similar help and support threads for2: Fake LinkedIn e-mails lead to Zeus Trojan|
|Fake Miles & More Emails Lead to Zbot Drive-By Download||System Security|
|More Than Half Of Major Banks Infected With Conficker, Zeus, Fake AV..||Security News|
|Zeus returns, SpyEye banking malware, Fake Kim Jong-il video||Security News|
|Fake Microsoft Patch Tuesday emails lead to ZeuS crimeware||Security News|
|Fake Facebook Alerts Distribute ZeuS Trojan||Security News|
|A New Banking Trojan Takes on ZeuS||Security News|
|Zeus trojan virus||News|
|Our Sites ||Site Links ||About Us ||Find Us |
© Designer Media Ltd
All times are GMT -5. The time now is 06:39 PM.