Feeds

Tsunami relief donors under cyber-attack, says FBI

Trojans and 419ers mobilise

  • alert
  • submit to reddit

The essential guide to IT transformation

The US Federal Bureau of Investigation (FBI) reports that Netizens wishing to help victims of the recent tsunami, and who attempt to donate money online to relief organizations, may themselves become victims of a browser exploit that will infect their boxes.

Characteristically short on specifics, the Bureau fails to mention which of the several recent browser exploits affecting and infecting IE users is in play.

"False Web sites have been established that pretend to be legitimate relief organizations asking for donations - one of which contains an embedded Trojan exploit that can infect your computer with a virus if accessed," the Bureau reported Wednesday.

Which website, and which exploit, we are left to guess. Far be it from the FBI to diminish its own inflated importance, or inflated budget, by offering a few tiny scraps of information with which we might protect ourselves without its intervention.

"What are we doing about it?" the Bureau asks rhetorically.

It answers itself thus: "The FBI, in conjunction with domestic with [sic] international law enforcement and industry partners, abhor [sic] these egregious actions and are [sic] resolved to aggressively pursuing [sic] those who would attempt to victimize philanthropic individuals."

So, what it's doing is: it's abhorring with the appropriate degree of indignation, and it's resolving to act at the appropriate time and in the appropriate manner, exhibiting the classic Bush administration Leadership Qualities from which Americans derive no end of comfort.

Additionally, there have been 419 scam emails circulating, the Bureau says, in which purported rich victims of the recent calamity, now suddenly destitute, appeal for help in retrieving money deposited overseas.

Perhaps most appalling, those who have appealed online for information about missing friends and relatives are being contacted via email by opportunists proposing to investigate, in exchange for a hefty retainer.

Ain't technology wonderful? ®

Related Stories

Man, 40, admits tsunami hoax emails
Windows XP users Phelled by new Trojan
Bofra exploit tied to 'massive botnet'
New Bagle worm drops in and downloads
Download.Ject-style worm spreads via IM
Watch out there's an IE bug about
Bofra worm sets trap for unwary

5 things you didn’t know about cloud backup

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.