Feeds

'Obama quits' spam recruits zombie drones

President-Elect heading for office, not Pacific island

SANS - Survey on application security programs

Scammers are capitalising on worldwide interest about Barack Obama's inauguration via a spam email campaign that claims the Illinois senator turned prez44 plans to turn down the office he fought so long to obtain.

The messages falsely claim the President-Elect doesn’t want the responsibility of saving a "sinking ship". This sensationalist message, like many others before it, some of which even claimed that WWIII had broken out in the Middle East, are designed to trick the credulous into visiting a fraudulent website that harbours malicious code.

Prospective marks clicking onto sites promoted via the spam campaign are redirected to lookalike Obama campaign websites designed to trick the gullible into downloading malicious code that turns compromised clients into zombie drones on the Waledec botnet, according to security researchers at Marshal8e6. The bogus websites - with domains including "greatobama" or "superobama" - contain links to a file called “barakspeech.exe”, or similar.

Users who run this file on an unprotected Windows PC get pwned. The fraudulent emails associated with the campaign come with subject lines such as "Amazing News".

"The web site that these spam messages link to looks official and convincing at first glance," said Phil Hay, senior threat analyst for the Marshal8e6 TRACE Labs. "Closer examination reveals numerous spelling and grammatical errors on the site which could alert wary email users that this is a trick.

"Unfortunately we expect that many users who are lured to these sites will invariably click on the link and infect themselves."

The Waledec botnet first appeared on the scene in December 2008, taking up the Storm botnet’s stock in trade of spreading malware by tricking users into visiting sites containing malware promoted via sensational news headlines or other social engineering tricks. Some researchers reckon the gang behind the Storm botnet are also behind Waledec.

More details of the attack, including a list of the spoofed domains and screen shots, can be found in a write-up by Panda Security here.

Back to reality

Back in the real world plans to stage Obama's historic inauguration are proceeding. The LA Times reports that security officials are creating the most "high-tech security bubble ever" ever to protect the incoming president. Metal detectors will be in place to screen ticket holders. All inaugural personnel will be put through criminal background checks.

Sharpshooters will be posted on rooftops. There'll be surveillance of metro lines and of the crowd attending the event. A number of mobile command posts have been established. The FBI has a weapons-of-mass-destruction response truck on standby and Obama himself will ride in an armoured limo said to be capable of withstanding even rocket-propelled grenade attack.

Despite all these precautions, security experts are still wary of the possibility of a lone individual or small group getting into the event and causing disruption, even though Obama and his family will be very well protected.

Those unable to watch the event will be able to look at live streaming feeds on the internet, if everything goes to plan. Computerworld reports that some experts are expecting anything between jittery video to a huge traffic surge that will slow internet performance. Warnings of this type are commonly issued by bandwidth optimisation or workplace filtering firms in the run-up to major sporting events, such as the Olympics and World Cup.

Real problems almost never arise. Even in the worse case scenario, internet surfers interested in the Obama inauguration can listen to the inauguration line on the radio or TV in the vast majority of locations where broadband internet viewing is even an option. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.