Feeds

Tsunami relief donors under cyber-attack, says FBI

Trojans and 419ers mobilise

  • alert
  • submit to reddit

Internet Security Threat Report 2014

The US Federal Bureau of Investigation (FBI) reports that Netizens wishing to help victims of the recent tsunami, and who attempt to donate money online to relief organizations, may themselves become victims of a browser exploit that will infect their boxes.

Characteristically short on specifics, the Bureau fails to mention which of the several recent browser exploits affecting and infecting IE users is in play.

"False Web sites have been established that pretend to be legitimate relief organizations asking for donations - one of which contains an embedded Trojan exploit that can infect your computer with a virus if accessed," the Bureau reported Wednesday.

Which website, and which exploit, we are left to guess. Far be it from the FBI to diminish its own inflated importance, or inflated budget, by offering a few tiny scraps of information with which we might protect ourselves without its intervention.

"What are we doing about it?" the Bureau asks rhetorically.

It answers itself thus: "The FBI, in conjunction with domestic with [sic] international law enforcement and industry partners, abhor [sic] these egregious actions and are [sic] resolved to aggressively pursuing [sic] those who would attempt to victimize philanthropic individuals."

So, what it's doing is: it's abhorring with the appropriate degree of indignation, and it's resolving to act at the appropriate time and in the appropriate manner, exhibiting the classic Bush administration Leadership Qualities from which Americans derive no end of comfort.

Additionally, there have been 419 scam emails circulating, the Bureau says, in which purported rich victims of the recent calamity, now suddenly destitute, appeal for help in retrieving money deposited overseas.

Perhaps most appalling, those who have appealed online for information about missing friends and relatives are being contacted via email by opportunists proposing to investigate, in exchange for a hefty retainer.

Ain't technology wonderful? ®

Related Stories

Man, 40, admits tsunami hoax emails
Windows XP users Phelled by new Trojan
Bofra exploit tied to 'massive botnet'
New Bagle worm drops in and downloads
Download.Ject-style worm spreads via IM
Watch out there's an IE bug about
Bofra worm sets trap for unwary

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.