Feeds

Tsunami relief donors under cyber-attack, says FBI

Trojans and 419ers mobilise

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

The US Federal Bureau of Investigation (FBI) reports that Netizens wishing to help victims of the recent tsunami, and who attempt to donate money online to relief organizations, may themselves become victims of a browser exploit that will infect their boxes.

Characteristically short on specifics, the Bureau fails to mention which of the several recent browser exploits affecting and infecting IE users is in play.

"False Web sites have been established that pretend to be legitimate relief organizations asking for donations - one of which contains an embedded Trojan exploit that can infect your computer with a virus if accessed," the Bureau reported Wednesday.

Which website, and which exploit, we are left to guess. Far be it from the FBI to diminish its own inflated importance, or inflated budget, by offering a few tiny scraps of information with which we might protect ourselves without its intervention.

"What are we doing about it?" the Bureau asks rhetorically.

It answers itself thus: "The FBI, in conjunction with domestic with [sic] international law enforcement and industry partners, abhor [sic] these egregious actions and are [sic] resolved to aggressively pursuing [sic] those who would attempt to victimize philanthropic individuals."

So, what it's doing is: it's abhorring with the appropriate degree of indignation, and it's resolving to act at the appropriate time and in the appropriate manner, exhibiting the classic Bush administration Leadership Qualities from which Americans derive no end of comfort.

Additionally, there have been 419 scam emails circulating, the Bureau says, in which purported rich victims of the recent calamity, now suddenly destitute, appeal for help in retrieving money deposited overseas.

Perhaps most appalling, those who have appealed online for information about missing friends and relatives are being contacted via email by opportunists proposing to investigate, in exchange for a hefty retainer.

Ain't technology wonderful? ®

Related Stories

Man, 40, admits tsunami hoax emails
Windows XP users Phelled by new Trojan
Bofra exploit tied to 'massive botnet'
New Bagle worm drops in and downloads
Download.Ject-style worm spreads via IM
Watch out there's an IE bug about
Bofra worm sets trap for unwary

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Slap for SnapChat web app in SNAP mishap: '200,000' snaps sapped
This is what happens if you hand your username and password to a 3rd-party
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.