Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Guest Blog // Selected Security Content Provided By Sophos
What's This?
06:00 AM
Graham Cluley
Graham Cluley
Security Insights

Kanye West Car Crash Hoax Fuels Hacker Scareware Attack

An Internet rumor that controversial rapper Kanye West has died in a Los Angeles car crash is being taken advantage of by cybercriminals, bent on stealing money through fake antivirus alerts.

An Internet rumor that controversial rapper Kanye West has died in a Los Angeles car crash is being taken advantage of by cybercriminals, bent on stealing money through fake antivirus alerts.The bogus story, which has been repeated across the Internet and is the subject of many postings on social networks, such as Facebook and Twitter, says that there was a:

"bizarre car crash in Los Angeles involving two luxury cars early this morning rapper Kanye West dead, a second injured, a third arrested for gross vehicular manslaughter and a fourth person was detained by police."

(You can read the full hoax in my blog entry on the Sophos Website).

In truth, the rumor appears to have started as a prank on the 4Chan Website.

However, the story's dubious provenance hasn't prevented others from repeating it, and -- sadly -- hackers from taking advantage of what is currently one of the most commonly searched-for topics on the Internet.

Kanye West Died search trend stats

Using the familiar trick of poisoning search results through SEO techniques, hackers are directing users to malicious Web pages designed to display fake antivirus warnings and scare users into making unwise purchases.

Poisoned webpage rides high in search rankings

Scareware, rogueware, fake antivirus -- call it what you like. It's one of the biggest growth areas in cybercrime right now. The bad guys are taking advantage of users' fear of computer infection and identity theft, hacking Web sites to display bogus warnings that are designed to fool you and your colleagues into making bad decisions that could impact your company's data and your own wallet.

By the way, this isn't the first time Kanye West has caught the attention of cybercriminals. For instance, earlier this year it came to light that his Gmail, MySpace, and Twitter accounts had been broken into.

Graham Cluley is senior technology consultant at Sophos, and has been working in the computer security field since the early 1990s. When he's not updating his other blog on the Sophos website, you can find him on Twitter at @gcluley. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-07-17
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis r...
PUBLISHED: 2019-07-17
In ONOS 1.15.0, apps/yang/web/src/main/java/org/onosproject/yang/web/YangWebResource.java mishandles backquote characters within strings that can be used in a shell command.
PUBLISHED: 2019-07-17
NSA Ghidra before 9.0.1 allows XXE when a project is opened or restored, or a tool is imported, as demonstrated by a project.prp file.
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.