Update: Fake CNN spam mutates as attacks continue
Malware-serving menace rolls on
Computerworld - The massive attack that has infected PCs by tricking users into clicking links in fake messages from CNN.com shows little sign of ending soon, security researchers said on Friday.
According to MX Logic Inc., spam posing as CNN.com Top 10 lists peaked at close to 11 million messages per hour early Thursday, but it remained at high volumes throughout the day Friday. The Denver-based security vendor said it had been tracking an average of 8 million messages per hour since midnight.
Sam Masiello, MX Logic's vice president of information security, called the trend "a very slow but steady decline" from the 11 a.m. Mountain Time peak the day before.
Masiello also said that the unsolicited e-mail has changed since attacks were first launched on Tuesday. "We've also seen several morphs of this spam over the past couple of days," he said in an entry posted on the MX Logic blog on Friday. Where the messages once trumpeted "CNN.com Daily Top 10" in the subject heading and linked to a single file name on malware-hosting sites, now the spam sports a subject reading "CNN Alerts: My Custom Alert" and uses a variety of file names in the malicious URL.
"This is likely in response to all of the media attention and awareness that has been brought up over the past couple of days," Masiello speculated.
Also on Friday, Websense Inc. reported that its researchers had seen the attack mutating, with the spam subject heading not only touting "CNN Alerts: My Custom Alert," but also using legitimate news stories culled from CNN to make the messages more convincing.
Users who clicked on the "FULL STORY" link in the message were redirected to a fake CNN site, where they were told they needed to download an update to Flash Player, Adobe Systems Inc.'s popular Internet media player, to view a video clip from CNN.
Websense also said it had spotted traces of the campaign in blog spam.
If users agreed to download the bogus Flash update, they were trapped in an endless loop, where clicking "Cancel" in the initial dialog produced a second pop-up. Clicking "Cancel" there returned the user to the first pop-up. The only options at that point were for users to shut down the browser or give in and install the malware.
MX Logic added that it had seen the URLs in the spam lead to legitimate domains that had probably been compromised, and it named a U.K.-based roofing company as an example.
Earlier this week, Bulgarian security researcher Dancho Danchev had found more than 1,000 compromised domains being used to serve up the fake Flash. In a follow-up e-mail, Danchev said that in most cases, he couldn't find any characteristics shared by the hacked sites, such as all being hosted by a single Internet service provider.
"My assumption is that they took the time and effort to do some reconnaissance of sites which are vulnerable to remote file inclusion or other type of remotely exploitable flaw within their Web applications that would allow someone to locally host all the malicious files," Danchev said. "I wouldn't be surprised if I find out that someone has basically went through all keylogged Cpanel passwords he obtained through his botnet or through the access to a botnet that he temporarily rented."
Cpanel, a popular server control-panel program, has been targeted by password thieves in the past because of the access those passwords provide to sites.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- System and Data Protection, Recovery and Availability This white paper describes how ARCserve works and the benefits it can provide IT environments of all sizes.
- Simplifying Data Protection, Reducing Risk of Data Loss and System Downtime This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection,...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Malware and Vulnerabilities White Papers |