Feeds

Tsunami relief donors under cyber-attack, says FBI

Trojans and 419ers mobilise

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

The US Federal Bureau of Investigation (FBI) reports that Netizens wishing to help victims of the recent tsunami, and who attempt to donate money online to relief organizations, may themselves become victims of a browser exploit that will infect their boxes.

Characteristically short on specifics, the Bureau fails to mention which of the several recent browser exploits affecting and infecting IE users is in play.

"False Web sites have been established that pretend to be legitimate relief organizations asking for donations - one of which contains an embedded Trojan exploit that can infect your computer with a virus if accessed," the Bureau reported Wednesday.

Which website, and which exploit, we are left to guess. Far be it from the FBI to diminish its own inflated importance, or inflated budget, by offering a few tiny scraps of information with which we might protect ourselves without its intervention.

"What are we doing about it?" the Bureau asks rhetorically.

It answers itself thus: "The FBI, in conjunction with domestic with [sic] international law enforcement and industry partners, abhor [sic] these egregious actions and are [sic] resolved to aggressively pursuing [sic] those who would attempt to victimize philanthropic individuals."

So, what it's doing is: it's abhorring with the appropriate degree of indignation, and it's resolving to act at the appropriate time and in the appropriate manner, exhibiting the classic Bush administration Leadership Qualities from which Americans derive no end of comfort.

Additionally, there have been 419 scam emails circulating, the Bureau says, in which purported rich victims of the recent calamity, now suddenly destitute, appeal for help in retrieving money deposited overseas.

Perhaps most appalling, those who have appealed online for information about missing friends and relatives are being contacted via email by opportunists proposing to investigate, in exchange for a hefty retainer.

Ain't technology wonderful? ®

Related Stories

Man, 40, admits tsunami hoax emails
Windows XP users Phelled by new Trojan
Bofra exploit tied to 'massive botnet'
New Bagle worm drops in and downloads
Download.Ject-style worm spreads via IM
Watch out there's an IE bug about
Bofra worm sets trap for unwary

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.