Read

User menu

Search form

Techtivist Report: Beware the Spy in Spam

Techtivist Report: Beware the Spy in Spam
Thu, 3/21/2013 - by Conrad Jaeger

Pope Francis had barely donned his new white robes before cybercriminals were targeting his flock with spam emails and social media posts in a bid to suck money out of their bank accounts. But it’s not just the spammers who make use of these tricks and tools. Increasingly, intelligence agencies are preying on the gullibility of activists.

Emails purporting to be from CNN with enticing headlines linking the new Pontiff to child sex abuse rapidly drew a lot of concerned Catholics and others to spoof websites compromised by Blackhole Exploit Kits. Unwittingly, many then fell victim to remote access Trojans, backdoors, infostealers and rootkits.

The new Pope is in good company. In the past, cybercriminals have lured the unsuspecting with lurid tales of Justin Bieber’s sex life and the death of Jackie Chan.

The term for this type of scam is "social engineering," broadly defined as the act of tricking people into giving out confidential information or unwisely opening themselves to infection. Cyber criminals make the most of news events and consumer trends by enticing users to infected websites or by planting malware in their system via email.

When activists in Bahrain recently began receiving emails with suspicious attachments, they passed them on to journalists at Bloomberg who then had them analyzed. Hidden inside they found FinSpy, a nasty piece of malware designed to take control of phones and computers from afar.

“FinSpy can be sent to people in spoof emails to secretly monitor their computers – intercepting Skype calls, turning on web cameras and recording every keystroke,” Bloomberg told its readers.

The U.K.-based Gamma Group markets FinSpy directly to law enforcement and intelligence agencies but denies selling to Bahrain, saying someone else must have duplicated the program and sold it to the repressive Gulf state.

Meanwhile, FinSpy has been discovered running on servers in 25 countries, according to researchers at the University of Toronto’s Munk School of Global Affairs’ Citizen Lab.

For the alarm to have been raised in the first place, the Bahrain activists may have been alerted by a simple anti-virus program that warned they were being diverted to a malicious website.

To guard against these attacks, a safe option is to use a combination of standalone security software with one firewall, one or two anti-virus programs, and one or two anti-spyware programs, plus dedicated anti-Trojan software. Avoid running them all in ‘real-time’ to avoid software conflicts and, instead, regularly scan the computer and update manually.

To avoid infection via email, disable HTML in the email program via the Settings tab. Look for and untick Display attachments inline or tick View message body as plain text. Never open attachments or click on links if you are unsure of their origin. Equally, be aware of social media posts with enticing links.

Among the most dangerous forms of malware are Key Stroke Logging programs and, in extreme cases, tiny hardware versions that can be hidden inside the computer. These work by logging every keystroke and mouse movement. KeyScrambler offer several solutions, including a free option, to scramble keystrokes and defeat surveillance.

As a rule, free, open-source software is preferable to the paid-for variety because developers and others can have a good look inside for backdoors and other things that should not be there.

Comodo Personal Firewall, free and paid-for versions of combined anti-virus and firewall programs. It protects against viruses, Trojans, worms, hacker attacks and other threats.

Lavasoft’s Ad-Aware, free and paid-for versions. Provides core protection against Internet threats. Featuring real-time anti-malware protection, advanced Genocode detection technology, rootkit protection and scheduler.

Spybot Search and Destroy, free, fully functioning privacy and anti-malware software.

AVG Anti Rootkit, removes Rootkits, a malicious program somewhere between a virus and Trojan horse which open computers to external attack.

Avast Free Antivirus, full-featured software with the same antivirus and anti-spyware scanning engine used in Avast’s premium products.

AVG Anti-Virus Free Edition, probably best of the bunch when it comes to free anti-virus software.

Read more by Conrad Jaeger at Techtivist.com and follow him at @conradjaeger.

3 WAYS TO SHOW YOUR SUPPORT

ONE-TIME DONATION

Just use the simple form below to make a single direct donation.

DONATE NOW

MONTHLY DONATION

Be a sustaining sponsor. Give a reacurring monthly donation at any level.

GET SOME MERCH!

Now you can wear your support too! From T-Shirts to tote bags.

SHOP TODAY

Sign Up

Article Tabs

It isn’t difficult to argue that Musk is likely a white supremacist obsessed with increasing the white birthrate and simultaneously killing off undesirables by cutting off their aid.

In a political earthquake last year, the populist and racist Reform Party took 4.1 million votes, coming third, against a backdrop of collapsing living standards and accelerating impoverishment.

There are multiple similarities between Trump and the British monarch when looking at the 27 grievances the framers outlined in their 1776 declaration.

It is not hyperbole to say that the world’s richest man has now illegally seized control of America’s checkbook and the entire federal workforce.

Over the next four years, we’re about to be inundated with a flood of lies—including from federal agencies themselves.

A broad range of Americans are organizing a 24-hour economic boycott on February 28th to protest the ongoing actions of the Trump administration and to send a message to corporate America.

It isn’t difficult to argue that Musk is likely a white supremacist obsessed with increasing the white birthrate and simultaneously killing off undesirables by cutting off their aid.

In a political earthquake last year, the populist and racist Reform Party took 4.1 million votes, coming third, against a backdrop of collapsing living standards and accelerating impoverishment.

There are multiple similarities between Trump and the British monarch when looking at the 27 grievances the framers outlined in their 1776 declaration.

The grassroots opposition to President Donald Trump is hitting the streets everywhere.

Over the next two years, Democrats have the unfettered ability to be an albatross around the neck of the GOP — and to make sure that what little they manage to get done due to their paper-thin majorities becomes the reason for their undoing.

Posted 1 month 2 weeks ago

There are multiple similarities between Trump and the British monarch when looking at the 27 grievances the framers outlined in their 1776 declaration.

Posted 2 weeks 3 days ago

It isn’t difficult to argue that Musk is likely a white supremacist obsessed with increasing the white birthrate and simultaneously killing off undesirables by cutting off their aid.

Posted 1 week 2 days ago

Over the next four years, we’re about to be inundated with a flood of lies—including from federal agencies themselves.

Posted 4 weeks 1 day ago

A broad range of Americans are organizing a 24-hour economic boycott on February 28th to protest the ongoing actions of the Trump administration and to send a message to corporate America.

Posted 1 week 2 days ago

Protests are set to take place in several major cities across the U.S. on Monday, the Presidents Day holiday, according to activists.

There are multiple similarities between Trump and the British monarch when looking at the 27 grievances the framers outlined in their 1776 declaration.

The grassroots opposition to President Donald Trump is hitting the streets everywhere.