Feeds

Tsunami relief donors under cyber-attack, says FBI

Trojans and 419ers mobilise

  • alert
  • submit to reddit

The essential guide to IT transformation

The US Federal Bureau of Investigation (FBI) reports that Netizens wishing to help victims of the recent tsunami, and who attempt to donate money online to relief organizations, may themselves become victims of a browser exploit that will infect their boxes.

Characteristically short on specifics, the Bureau fails to mention which of the several recent browser exploits affecting and infecting IE users is in play.

"False Web sites have been established that pretend to be legitimate relief organizations asking for donations - one of which contains an embedded Trojan exploit that can infect your computer with a virus if accessed," the Bureau reported Wednesday.

Which website, and which exploit, we are left to guess. Far be it from the FBI to diminish its own inflated importance, or inflated budget, by offering a few tiny scraps of information with which we might protect ourselves without its intervention.

"What are we doing about it?" the Bureau asks rhetorically.

It answers itself thus: "The FBI, in conjunction with domestic with [sic] international law enforcement and industry partners, abhor [sic] these egregious actions and are [sic] resolved to aggressively pursuing [sic] those who would attempt to victimize philanthropic individuals."

So, what it's doing is: it's abhorring with the appropriate degree of indignation, and it's resolving to act at the appropriate time and in the appropriate manner, exhibiting the classic Bush administration Leadership Qualities from which Americans derive no end of comfort.

Additionally, there have been 419 scam emails circulating, the Bureau says, in which purported rich victims of the recent calamity, now suddenly destitute, appeal for help in retrieving money deposited overseas.

Perhaps most appalling, those who have appealed online for information about missing friends and relatives are being contacted via email by opportunists proposing to investigate, in exchange for a hefty retainer.

Ain't technology wonderful? ®

Related Stories

Man, 40, admits tsunami hoax emails
Windows XP users Phelled by new Trojan
Bofra exploit tied to 'massive botnet'
New Bagle worm drops in and downloads
Download.Ject-style worm spreads via IM
Watch out there's an IE bug about
Bofra worm sets trap for unwary

Next gen security for virtualised datacentres

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up Big Data
Solving backup challenges and “protect everything from everywhere,” as we move into the era of big data management and the adoption of BYOD.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?