Feeds

Trojan poses as Osama capture pics

More viral dirty tricks

  • alert
  • submit to reddit

Seven Steps to Software Security

Spam emails that try to dupe Windows users into infection by offering information about the supposed capture of terrorist mastermind Osama bin Laden were sent to an estimated one million surfers yesterday. The bogus emails attempt to seed infection of a new downloader Trojan, Small-AXR, contained in a pics.scr file within a zip attachment of the fraudulent messages.

The text of infected messages typically states:

Turn on your TV. Osama Bin Laden has been captured. While CNN has no pictures at this point of time, the military channel (PPV) released some pictures. I managed to capture a couple of these pictures off my TV. Ive attached a slideshow containing all the pictures I managed to capture. I apologize for the low quality, its the best I could do at this point of time. Hopefully CNN will have pictures and a video soon. God bless the USA!

Subject lines of the virus-infected email include: "God Bless America!", "Captured! Finally!" and "Finally! Captured!". Anti-virus vendors urge users to ignore any such message and, more particularly, to avoid the temptation to click on the attachment.

Email filtering firm BlackSpider Technologies said that over one million emails containing a downloader Trojan have been sent globally since 7.15pm on Wednesday (2 June).

The Small-AXR Trojan is the latest in a growing list of attempts by virus writers to exploit interest in the infamous al-Qaeda leader to spread malware. Last July VXers tried to trick users into opening a Hackarmy Trojan horse on their PC by passing malicious code off as "suicide photographs" of bin Laden. At a result, Usenet newsgroups are overflowing with bogus messages claiming that journalists found the terrorist leader's hanged body. In November, similar tactics were used in an attempt to spread infection of the Famus-F worm. ®

Related stories

Trojan poses as bin Laden suicide pics
Email worm poses as Osama videogram
Panto bin Laden in New York, New York outrage
Trojan poses as Berg video footage
Worm poses as Saddam death pics

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.