Marshal issues warning against new storm of 'confirmation spam'

Dark Reading Staff, Dark Reading

August 22, 2007

2 Min Read

ATLANTA -- Email and Internet content security provider Marshal has identified a new outbreak of malicious spam emails that use login account confirmation details as a hook to get email users to visit an infected web site.

According to the Marshal Threat Research and Content Engineering (TRACE) team, the spam emails appear to come from a legitimate organization and provides recipients with temporary login confirmation details for a web site. The spam uses text like “for security purposes, please login and change the temporary Login ID and Password”. The messages include a link to an IP address which is in fact a website infected with the Storm Trojan.

The messages appear to come from the technical support departments of a range of organizations with names designed to generate the interest of the broad public, such as “Joke-A-Day” and “Web Players”. The links appear as an IP address rather than a more normal URL.

“We are seeing significant volumes of ‘confirmation spam’ hitting inboxes. This outbreak is the latest in a string of underhanded social engineering tactics used by the same individuals responsible for the Storm Trojan to propagate their botnet. These criminals are clever and highly adaptive. This is simply their latest attempt to fool unsuspecting email users into infecting themselves,” said Bradley Anstis, Director of Product Management at Marshal.

The Storm Trojan first appeared in January 2007. It quickly gained success and notoriety by using the guise of current affairs headlines to fool unsuspecting recipients into clicking on a link which lead to the Trojan. Examples of the headlines used included, “Saddam Hussein Alive!” and “Chinese missile shot down by USA aircraft”. Since then the group of criminals behind the Storm Trojan have used the guise of greeting cards to infect computers with subjects ranging from the 4th of July to Thank You cards.

“The ‘confirmation spam’ outbreak has been launched by the same group that launched the Hot Pictures spam campaign earlier in the week. Previously these spam campaigns, like the greeting card campaign, would last for weeks at a time. Now however, spammers are modifying or launching new spam campaigns almost daily,” commented Anstis.

Marshal Inc.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights