Feeds

Lads from Lagos crack cabinet minister's webmail account

Person in peril scam follows mystery Hotmail hack

Using blade systems to cut costs and sharpen efficiencies

Advanced fee fraudsters have broken into the webmail account of UK Justice Secretary Jack Straw to mount an audacious, and potentially politically embarrassing, scam.

Hundreds of Straw's contacts received a bogus (and frankly implausible) message on Thursday claiming the cabinet minister was stranded in Nigeria and in desperate need of $3,000 dollars to settle expenses get a flight home. Constituents, Ministry of Justice officials, Labour members and council bosses all received the bogus assistance pleas, The Daily Telegraph reports.

The email, sent from a Hotmail account, claimed Straw was in Nigeria promoting a charity called Empowering Youth to Fight Racism, and was supposedly in trouble after losing his wallet. One constituent reportedly replied to the bogus email, but no money was offered.

The Hotmail account used in the attack was later suspended but Straw's official website still lists blackburnlabour@hotmail.com as an email contact address for those interested in reaching the Blackburn MP.

It's unclear how miscreants broke into the account but the use of a brute force dictionary attack to uncover the password is one possibility. Trickery that allowed the password to be reset, as in the hack on a Yahoo! webmail account maintained by Sarah Palin, is another possibility. Fraudsters have hacked into Hotmail accounts to punt similar person in peril scams in the past but rarely have they picked on such a conspicuous target.

Straw confirmed the attack but said that the webmail account attacked was only used for constituency business and unrelated to his work in government.

"It was an issue for constituents, not the Government. We are checking all that and I am assured there's no evidence that confidentiality of constituents was affected," the former Home Secretary told The Telegraph. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.