Feeds

Storm Worms exploit April Fools

Lazy attack aims to dupe the credulous

Website security in corporate America

The miscreants behind the Storm Worm botnet have taken advantage of April Fools' day in a bid to infect more Windows PCs.

Security firms are warning users to avoid the temptation to click on April Fools' day emails that may redirect them to maliciously constructed websites.

The latest attempt to dupe more gullible users into getting their PCs infected kicked off on Monday with a spam campaign designed to trick recipients into visiting websites under the control of hackers containing executables with names such such as foolsday.exe, Kickme.exe or funny.exe.

So far the miscreants punting the scam haven't even bothered to include exploit code, net security firm F-secure notes. Potential marks are simply invited to download the malware, promoted via a spam mail campaign.

These spam emails feature Subject Lines such as "April Fool’s Day" and an equally unimaginative choice of images.

Trend Micro reports that the miscreants behind the attack were too indolent to actually create their own image to represent the holiday, so they simply Googled "April Fools" and used the first image that showed up.

The creators of the Storm Worm have a history of using holidays and special events as lures for their malware. The last major Storm run was in the weeks leading up to Valentine's Day.

As before, the latest spam campaign is designed to infect new computers that will then become part of the larger Storm Worm botnet. These compromised PCs can then be hired out to spammers, miscreants interested in running denial of service attacks, adware distributors, and other internet denizens. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.