New attack blends the physical and virtual worlds to infect victims
Cybercriminals took their malware to the streets in Grand Forks, N.D., where some motorists recently found parking violation notices on their windshields instructing them to visit a URL to view photos of their purported infraction. The phony parking ticket scontained a malicious URL that requires them to download a toolbar, which is actually a Trojan.
The "toolbar" shows photos of parked cars in the area; the user is prompted with a pop-up with a fake security alert, attempting to lure the victim into installing phony antivirus software to clean up their machine.
"The malicious programs were run-of-the-mill; however, the use of flyers was an innovative way of social-engineering potential victims into visiting a malicious website," said Lenny Zeltser, a SANS Internet Storm Center analyst in a blog post on the attack.
Zeltser, who analyzed the malware and the attack, says the initial malware is automatically installed as a browser helper object for Internet Explorer. It then downloads code from a notoriously bad domain that's well-known among security researchers (childhe.com), and then uses the fake security alert to trick the victim into installing more malware.
"Attackers continue to come up with creative ways of tricking potential victims into installing malicious software. Merging physical and virtual worlds via objects that point to websites is one way to do this. I imagine we'll be seeing such approaches more often," Zeltser blogged.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message
About the Author(s)
You May Also Like
Defending Against Today's Threat Landscape with MDR
April 18, 2024The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024