Feeds

Fraudsters limber up for World Cup themed scams

Can I click it? Yes you can (but probably shouldn't)

The Power of One eBook: Top reasons to choose HP BladeSystem

Fraudsters as well as footballers are gearing up for this month's World Cup extravaganza in South Africa.

Football governing body FIFA has already warned supporters to be wary over various forms of scams that are likely to crop up in the run-up to the start of the tournament, which kicks off in ten days.

FIFA lottery, prize draw or competition scams are likely to abound. All represent types of advanced fee fraud where fraudsters attempt to trick people into paying "administrative fees" supposedly needed to secure non-existent World Cup tickets or cash prizes.

"Prize draws and competitions offering tickets to the 2010 FIFA World Cup can only be held by companies who are commercially affiliated with FIFA, such as, for example, sponsors," it said.

FIFA also used the notice to issue a warning against ticket touts and unauthorised agents, a more standard message that has preceded every recent World Cup.

Spam emails touting 419-lite lottery scams themed around the World Cup are already in circulation (as recorded by Trend Micro here and here). More can be expected to follow as excitement builds toward the start of the tournament next month.

Security watchers report that scam emails seen thus far have not been sent through botnet networks of compromised PCs but via direct spamming from known Nigeria-based 419 scam-friendly IP addresses.

Search engine manipulation, themed around events at the World Cup and designed to divert users searching for video clips and news towards scareware portals, is also likely to crop up, among other types of malware attack, especially once the tournament kicks off.

MessageLabs, Symantec's hosted security division, has already begun intercepting World Cup-themed email-borne malware attacks. Infected email blocked by MessageLabs were sent from an IP address in Macau, China, and composed in Portuguese (targeting fans of Brazil and Portugal). The infected messages posed as emails from one of the event's soft drink sponsors.

Football fans receiving the email were encouraged to download a hacking tool that posed as a football-themed application.

“Once downloaded and activated, the malware produces files that generate pop-up messages and in the background collects information on what other machines are on the same network, enabling the attacker further access to the compromised networks,” explained Paul Wood, MessageLabs Intelligence senior analyst.

Symantec has set up a dedicated website that aims to track and warn football fans about net threats connected with the World Cup, as they arise. 2010NetThreat will also feature security advice, competitions and news on the tournament itself. ®

Designing a Defense for Mobile Applications

More from The Register

next story
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.