Bogus IRS beefs become latest scammer tool
FUD phishing echoes earlier Better Business Bureau-themed attack
Computerworld - In the latest narrow-cast attack, security researchers warned today, cybercriminals masquerading as the Internet Revenue Service are counting on the gullibility of business executives.
The e-mail attacks try to dupe recipients into opening the attached file by scaring them with a bogus allegation. "You have received a complaint in regards to your business services," the message begins. "Instructions on how to resolve this complaint as well as a copy of the original complaint are attached to this email."
Other social engineering tricks used by the attackers include the tax agency's logo in the message body, an attached Word document named COMPLAINT.rtf, and the message addressed directly to the recipient.
"Attacks targeting executives are increasingly common," said Ken Dunham, director of VeriSign iDefense's rapid response team, in an e-mail. "This latest attack is not highly prevalent on a global scale but represents a clear and present emergent threat against corporate executives."
If users launch the COMPLAINT.rtf attachment, a phony error message appears and a Trojan horse, called Robofo by Symantec Corp., installs. This backdoor steals passwords from browsers, instant messengers, and other software, then sends it to one of three hacker servers.
IDefense researchers also found a text string embedded in the malware's code -- "MrTheif11" -- that links the Trojan's author to an attack last week disguised as e-mail from the Better Business Bureau (BBB). Like the bogus IRS messages, those from the BBB came with files posing as Word .rtf documents and claimed to be complaints lodged against the recipient.
Targeted attacks against small numbers of corporate users have been on the upswing since early 2006, and although not the case here, often rely on malformed Microsoft Office documents. Microsoft Corp., in fact, has recently released enterprise tools and counseled companies on how to block malicious Word, Excel, and PowerPoint files.
Read more about Security in Computerworld's Security Topic Center.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!