Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Guest Blog // Selected Security Content Provided By Sophos
What's This?
08:16 AM
Graham Cluley
Graham Cluley
Security Insights

Heartless Hackers Exploit Death Of Dirty Dancing Star

Scareware attacks, in which hackers try to frighten innocent users into believing that their computers areinfected with viruses, are on the rise, and the cybercriminals behind them are exploiting hot news stories like never before.

Scareware attacks, in which hackers try to frighten innocent users into believing that their computers areinfected with viruses, are on the rise, and the cybercriminals behind them are exploiting hot news stories like never before.In the past few days, security researchers have identified campaigns revolving around a number of different topics -- including Serena Williams' outburst at the U.S. Open, and the anniversary of the 9/11 terrorist attacks -- in an attempt to lure unwary surfers into visiting a malicious Web page.

In the latest attack, hackers have created Web pages carrying content regarding yesterday's death of Hollywood actor Patrick Swayze, in the hope that fans will click on dangerous links and be fooled by bogus security warnings.

As the video below demonstrates, just hours after the announcement of Swayze's sad death the criminals began using optimization techniques to boost the poisoned pages high in search engine rankings.

In this example, Sophos detects the malware as Troj/FakeAl-L.

Increasingly we are seeing that one of the methods being used by hackers who plant scareware is to break into existing Websites, creating Web pages that are stuffed with relevant keywords in the hope they will end up higher in search results rather than creating brand new sites.

The worry is, how many computer users will believe the fake antivirus warnings, put themselves at risk of infection, and be defrauded out of their hard-earned cash?

If you're running a business, then you need to have in place protection that automatically scans the Websites in the background as your staff visit them.

You simply cannot trust that the search results they click on any single day will not lead them to malicious pages deliberately planted by a cybercriminal.

Graham Cluley is senior technology consultant at Sophos, and has been working in the computer security field since the early 1990s. When he's not updating his other blog on the Sophos website, you can find him on Twitter at @gcluley. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
'Box Shield' Brings New Security Controls
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
New FISMA Report Shows Progress, Gaps in Federal Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-23
cgi-bin/cmh/webcam.sh in Vera Edge Home Controller 1.7.4452 allows remote unauthenticated users to execute arbitrary OS commands via --output argument injection in the username parameter to /cgi-bin/cmh/webcam.sh.
PUBLISHED: 2019-08-23
CodiMD 1.3.1, when Safari is used, allows XSS via an IFRAME element with allow-top-navigation in the sandbox attribute, in conjunction with a data: URL.
PUBLISHED: 2019-08-22
In Docker before 18.09.4, an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs, and results in command injection into the ...
PUBLISHED: 2019-08-22
In GalliumOS 3.0, CONFIG_SECURITY_YAMA is disabled but /etc/sysctl.d/10-ptrace.conf tries to set /proc/sys/kernel/yama/ptrace_scope to 1, which might increase risk because of the appearance that a protection mechanism is present when actually it is not.
PUBLISHED: 2019-08-22
The import-users-from-csv-with-meta plugin before for WordPress has directory traversal.