Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Guest Blog // Selected Security Content Provided By Sophos
What's This?
1/25/2010
06:40 AM
Graham Cluley
Graham Cluley
Security Insights
50%
50%

Johnny Depp Death Crash Video Launches Malware Attack

An Internet rumor that Hollywood superstar Johnny Depp has died in a French car crash is being taken advantage of by cybercriminals, who have planted malware posing as video footage of the accident.

An Internet rumor that Hollywood superstar Johnny Depp has died in a French car crash is being taken advantage of by cybercriminals, who have planted malware posing as video footage of the accident.The bogus story, which has been repeated across the Internet and is the subject of many postings on social networks, such as Facebook and Twitter, claims:

"Johnny Depp's car was found along side a road outside Bordeaux, France, with the guard rail embedded deep inside the car. A tourist was driving down the road when he saw a car wreck alongside the road. He stepped out and tried to see if anyone was in there while his wife dialed the police for help. To his dismay, he found the a body in the car among liquor bottles. The police arrived at the scene shortly after and pulled out the body of the former actor, Johnny Depp."

In truth, the rumor appears to have started as a sick prank on a Website, posing as a CNN news report.

However, the story's dodgy source hasn't stopped others from repeating it, and -- sadly -- hackers have taken advantage of what is currently one of the most commonly searched-for topics on the Internet.

Watch this video to find out more:

Curious Internet users who search for information about Depp can find themselves on a Web page which claims to contain video evidence of his death.

The site, however, tries to trick you into downloading an ActiveX codec for your browser, infecting your Windows computer with a Trojan horse called Troj/Dldr-DB.

More details of this attack can be found on my blog on the Sophos website.

Johnny Depp is not the first celebrity to have had their bogus death exploited by hackers. In the past, Harry Potter actress Emma Watson and rapper Kanye West have both had fake stories distributed claiming that they died in car crashes, and actor Tom Cruise has has been the subject of false claims that he fell off a cliff while filming.

Graham Cluley is senior technology consultant at Sophos, and has been working in the computer security field since the early 1990s. When he's not updating his award-winning other blog on the Sophos website, you can find him on Twitter at @gcluley. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
New FISMA Report Shows Progress, Gaps in Federal Cybersecurity
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/21/2019
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15513
PUBLISHED: 2019-08-23
An issue was discovered in OpenWrt libuci (aka Library for the Unified Configuration Interface) as used on Motorola CX2L MWR04L 1.01 and C1 MWR03 1.01 devices. /tmp/.uci/network locking is mishandled after reception of a long SetWanSettings command, leading to a device hang.
CVE-2019-15504
PUBLISHED: 2019-08-23
drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).
CVE-2019-15505
PUBLISHED: 2019-08-23
drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).
CVE-2019-15507
PUBLISHED: 2019-08-23
In Octopus Deploy versions 2018.8.4 to 2019.7.6, when a web request proxy is configured, an authenticated user (in certain limited special-characters circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 2019.7.7. Th...
CVE-2019-15508
PUBLISHED: 2019-08-23
In Octopus Tentacle versions 3.0.8 to 5.0.0, when a web request proxy is configured, an authenticated user (in certain limited OctopusPrintVariables circumstances) could trigger a deployment that writes the web request proxy password to the deployment log in cleartext. This is fixed in 5.0.1. The fi...