New virus being distributed in fake FBI e-mail
The agency learned of the fraudulent e-mail over the weekend
Computerworld - A fake e-mail that purports to be from the FBI is circulating on the Internet with a computer virus as its payload.
In an announcement yesterday, the FBI warned that the fake unsolicited e-mail tells users that "their Internet use has been monitored by the FBI's Internet Fraud Complaint Center and that they have accessed illegal Web sites."
The bogus message then asks recipients to click on an attachment and answer some questions about their alleged illegal Internet use. But rather than being a questionnaire, the attachment contains a virus that infects the recipient's computer, according to the agency. It wasn't immediately clear what the virus does once it has infected a computer.
Paul Bresson, an FBI spokesman, today said that the agency discovered the fake e-mail over the weekend after several recipients of the messages notified the FBI. Bresson said he didn't know exactly how many complaints were received.
The latest scam appears to be the first time a virus has been distributed through an e-mail allegedly from the FBI, he said. A previous scheme involved e-mails that lured recipients to a fake Web site that looked like the FBI's official site, then asked recipients to enter their credit card number and personal information to determine if their card was one that recently had been stolen.
The latest message has multiple misspellings and is written in broken English, Bresson said. "The wording is very poor, which helps us," he said. "We're hoping that that flags people that this is not legitimate."
The message warns recipients that their Internet use continues to be watched and that the alleged illegal activity should be halted. "If there will be anover [sic] attemption [sic] you will be busted," the message states.
Bresson didn't know whether any victims of the scam have provided their credit card numbers or other information.
The FBI said that it never sends official unsolicited e-mails to citizens for any reason and that any messages purporting to be from the agency should be ignored. Recipients can also report them to the FBI's Internet Crime Complaint Center.
Pete Lindstrom, a security analyst at Spire Security LLC in Malvern, Pa., said fake e-mail messages will continue to be a problem until tighter standards for sending e-mails are adopted by senders and recipients. "The way we use e-mail today, anyone can impersonate anyone else," he said.
To stop that, users need to consider using trust certificates for all mail, so recipients know that an incoming message is from a trusted sender.
"Folks are going to have to rethink how easy this is [to sendand receive mail today], which made it very functional in the past," Lindstrom said, noting that the technical know-how to make mail more secure is already here.
"It becomes more of a question of willingness to do it," he said.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software See why CommVault was positioned as the #1 leader in Gartner's 2013 Magic Quadrant for Enterprise Backup/Recovery software for the 3rd year in...
- Forrester Report: CommVault is a Leader in Enterprise Backup and Recovery In this report, Forrester takes a deep dive into the evaluation criteria, how CommVault is positioned and the features and functionality that make...
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
All Malware and Vulnerabilities White Papers |