Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

8/22/2007
01:57 AM
50%
50%

Beware of 'Confirmation Spam'

Marshal issues warning against new storm of 'confirmation spam'

ATLANTA -- Email and Internet content security provider Marshal has identified a new outbreak of malicious spam emails that use login account confirmation details as a hook to get email users to visit an infected web site.

According to the Marshal Threat Research and Content Engineering (TRACE) team, the spam emails appear to come from a legitimate organization and provides recipients with temporary login confirmation details for a web site. The spam uses text like “for security purposes, please login and change the temporary Login ID and Password”. The messages include a link to an IP address which is in fact a website infected with the Storm Trojan.

The messages appear to come from the technical support departments of a range of organizations with names designed to generate the interest of the broad public, such as “Joke-A-Day” and “Web Players”. The links appear as an IP address rather than a more normal URL.

“We are seeing significant volumes of ‘confirmation spam’ hitting inboxes. This outbreak is the latest in a string of underhanded social engineering tactics used by the same individuals responsible for the Storm Trojan to propagate their botnet. These criminals are clever and highly adaptive. This is simply their latest attempt to fool unsuspecting email users into infecting themselves,” said Bradley Anstis, Director of Product Management at Marshal.

The Storm Trojan first appeared in January 2007. It quickly gained success and notoriety by using the guise of current affairs headlines to fool unsuspecting recipients into clicking on a link which lead to the Trojan. Examples of the headlines used included, “Saddam Hussein Alive!” and “Chinese missile shot down by USA aircraft”. Since then the group of criminals behind the Storm Trojan have used the guise of greeting cards to infect computers with subjects ranging from the 4th of July to Thank You cards.

“The ‘confirmation spam’ outbreak has been launched by the same group that launched the Hot Pictures spam campaign earlier in the week. Previously these spam campaigns, like the greeting card campaign, would last for weeks at a time. Now however, spammers are modifying or launching new spam campaigns almost daily,” commented Anstis.

Marshal Inc.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24259
PUBLISHED: 2021-05-05
The “Elementor Addon Elements� WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24260
PUBLISHED: 2021-05-05
The “Livemesh Addons for Elementor� WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.
CVE-2021-24261
PUBLISHED: 2021-05-05
The “HT Mega – Absolute Addons for Elementor Page Builder� WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by ...
CVE-2021-24262
PUBLISHED: 2021-05-05
The “WooLentor – WooCommerce Elementor Addons + Builder� WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-priv...
CVE-2021-24263
PUBLISHED: 2021-05-05
The “Elementor Addons – PowerPack Addons for Elementor� WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scriptin...