Feeds

Spyware blizzard shows no sign of let up

It's raining Trojans

  • alert
  • submit to reddit

Build a business case: developing custom apps

Hackers are continuing to target British workers with a series of specially crafted Trojan horse attacks two weeks after a UK government agency issued an unprecedented security warning. The latest batch of malware again targets a small network of specifically targeted domains in assaults designed to slip under the corporate radar and allow hackers to steal privileged information or launch further attacks from compromised systems.

In the latest attack, email security firm MessageLabs intercepted a small number of emails containing malicious software sent to would-be victims at just four domains. The majority of these 17 emails were bound for addresses at an unnamed international security organisation that was also targeted in a similar attack earlier this month, MessageLabs reports.

Using body text potentially relevant to the target audience, the email encouraged intended recipients to open an attached Word document. The attack exploits a well-known Word macro vulnerability (MS03-050) to inject hostile code, in this case an embedded Trojan, onto vulnerable systems.

MessageLabs reports growing incidents of targeted email attacks against businesses and organisations over the last year. Earlier this month the UK’s National Infrastructure Security Coordination Centre (NISCC) issued a warning about the industrial espionage potential threat posed by these attacks to governments and large corporates. Mark Sunner, Chief Technology Officer at MessageLabs, said: "The motivation behind today’s new email-borne threats is far more sinister than traditional methods of large-scale attacks. New criminal methods show a preference for selecting a particular target, whether an individual or an organisation, to attack for perhaps financial or competitive gain. The architects behind the bespoke Trojan attacks we are witnessing aim to steal confidential corporate information and intellectual property."

"In this evolving environment of customised attacks, organisations must adopt a more holistic approach to email security management; implementing stringent, formalised email security policies, alongside truly multi-layered, proactive technology measures to ensure protection against all known and unknown threats," he added. ®

Infected emails typically contain the subject line "FW : 0627" and body text (as follows) purporting to be from the Times of India:

THE TIMES OF INDIA

Monday, June 27, 2005

China's new JL-2 missile prevents US from the Taiwan affairs

China has successfully flight-tested a submarine-launched missile that U.S. officials say marks a major advance in Beijing's long-range nuclear program. The Bush administration has expressed new worries about China's military buildup. The JL-2 missile was launched from the new submarine, known as the Type 094, said a U.S. official familiar with it.

(Details in the attachment)

Related stories

UK Trojan siege has been running over a year
UK under cyber blitz
Window of exposure lets viruses run rampant
Spammers adopt slippery tactics to bypass ISP defences
Virtual postcard delivers Trojan

The essential guide to IT transformation

More from The Register

next story
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Know what Ferguson city needs right now? It's not Anonymous doxing random people
U-turn on vow to identify killer cop after fingering wrong bloke
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.