New virus being distributed in fake FBI e-mail
The agency learned of the fraudulent e-mail over the weekend
Computerworld - A fake e-mail that purports to be from the FBI is circulating on the Internet with a computer virus as its payload.
In an announcement yesterday, the FBI warned that the fake unsolicited e-mail tells users that "their Internet use has been monitored by the FBI's Internet Fraud Complaint Center and that they have accessed illegal Web sites."
The bogus message then asks recipients to click on an attachment and answer some questions about their alleged illegal Internet use. But rather than being a questionnaire, the attachment contains a virus that infects the recipient's computer, according to the agency. It wasn't immediately clear what the virus does once it has infected a computer.
Paul Bresson, an FBI spokesman, today said that the agency discovered the fake e-mail over the weekend after several recipients of the messages notified the FBI. Bresson said he didn't know exactly how many complaints were received.
The latest scam appears to be the first time a virus has been distributed through an e-mail allegedly from the FBI, he said. A previous scheme involved e-mails that lured recipients to a fake Web site that looked like the FBI's official site, then asked recipients to enter their credit card number and personal information to determine if their card was one that recently had been stolen.
The latest message has multiple misspellings and is written in broken English, Bresson said. "The wording is very poor, which helps us," he said. "We're hoping that that flags people that this is not legitimate."
The message warns recipients that their Internet use continues to be watched and that the alleged illegal activity should be halted. "If there will be anover [sic] attemption [sic] you will be busted," the message states.
Bresson didn't know whether any victims of the scam have provided their credit card numbers or other information.
The FBI said that it never sends official unsolicited e-mails to citizens for any reason and that any messages purporting to be from the agency should be ignored. Recipients can also report them to the FBI's Internet Crime Complaint Center.
Pete Lindstrom, a security analyst at Spire Security LLC in Malvern, Pa., said fake e-mail messages will continue to be a problem until tighter standards for sending e-mails are adopted by senders and recipients. "The way we use e-mail today, anyone can impersonate anyone else," he said.
To stop that, users need to consider using trust certificates for all mail, so recipients know that an incoming message is from a trusted sender.
"Folks are going to have to rethink how easy this is [to sendand receive mail today], which made it very functional in the past," Lindstrom said, noting that the technical know-how to make mail more secure is already here.
"It becomes more of a question of willingness to do it," he said.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Malware and Vulnerabilities White Papers | Webcasts