Malwareaware

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 15 April 2013

Why events that get massive media coverage are a boon for malware writers.

Posted on 18:02 by Unknown
Around 2:50 PM EDT today, two bombs were detonated in Boston on Boylston Street near Copley Square, just before the finish line of the 2013 Boston Marathon. The bombs killed at least 2 people and injured at least 134. Before I get started with this post, I would like to extend my deepest condolences to those affected by this act of terrorism. And I almost did not post this, because I do not think you deserve to go through the pain of discovering how malware writers are making money off of an event that caused you pain, physical or emotional. But the population at large deserves to know.

So, how do malware writers capitalize on events like these? The most destructive of ways is SEO poisoning, which is a method of cheating search engines so that infected websites end up at the top of the results. In this case, you could search for "Boston Marathon bombing" and you naturally click on one of the first results you see. From a search engine, these infected websites can do such things as redirect you to a website that claims that your computer is infected. If you are a fan of my blog, you no doubt notice that this is a classic method that rogue antivirus programs use to scare you. But this is just one example, the infected website could also download malware of all kinds to your computer without your knowledge.

A less destructive method used is by email. Malware writers send out mass emails either using an email account that the email originated from, or from a hijacked email account. So you can get an email from your friend in your inbox about the bombing that would have malware right in the message, or the malware could be in a fake "document" that supposedly contains information about it. One possible scenario is that the email could contain information about a fictitious "forth bomb."

Once again, I would like to extend my deepest condolences to those affected by this tragic event.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • How to remove System Doctor 2014
    There is a new rogue AV making the rounds on the web called System Doctor 2014. For those that have just started reading my blog or for thos...
  • What are Bitcoin Miners?
    For my first post about Bitcoins, and for what I wish to be my last about the subject, we are going to be talking about what Bitcoin miners ...
  • How to keep spies from monitoring you through your computer or your phone.
    Those of you in The United States of America have most likely heard about that whole IRS scandal and the accompanying scandals of wiretappin...
  • Spotlight on Malware: The Gruel Worm.
    It's been around since Windows 2000, but there still is not a way to remove this worm without formatting the hard drive. I speak of the ...
  • I am going to be a billionaire!
    For those of you that have been reading my blog for some time, you know I like to mess with scammers, fake tech support and the like. But th...
  • Use VBScript to pull a joke on your friends.
    Do you want to play a trick on your friends, family, or coworkers? Well this one's for you. You can make a fake piece of malware on your...
  • Spotlight on Malware: MyDoom
    The MyDoom Windows worm, also known as Novarg, and Shimgapi will be the subject of our focus for this post. The MyDoom worm was first discov...
  • CryptoLocker as of 11/3/2013
    If you have read my other posts on this, you know. But for those of you who do not, there is a piece of ransomware that has been making the ...
  • The Big Game: Who's on our side?
    I recently helped a friend of mine remove malware from their computer when she be one mused on how lonely my job must be. "It must be s...
  • Java: No more coffee for you.
    Odds are that every blogger that has a tight focus on computer security has authored a blog post about Java. So why am I wasting your time? ...

Categories

  • Android
  • History Of
  • iOS
  • Java
  • Macs
  • Passwords
  • Removal Guides
  • Spotlight On Malware
  • The CryptoLocker Saga
  • What Does It Mean?
  • What's in a name?
  • Windows

Blog Archive

  • ▼  2013 (151)
    • ►  November (10)
    • ►  October (5)
    • ►  September (15)
    • ►  August (22)
    • ►  July (26)
    • ►  June (17)
    • ►  May (25)
    • ▼  April (15)
      • Those silly scammers.
      • Is there such a thing is being too secure?
      • Passwords: Too Tough to Crack: Step 5 and The Wrap...
      • Passwords: Too Tough to Crack: Part 2
      • Shameless Plug: I talk about my new YouTube video.
      • Passwords: Too Tough to Crack: Part 1
      • Java: No more coffee for you.
      • The pen (or keyboard) is mightier then the malware!
      • Why events that get massive media coverage are a b...
      • URGENT Warning: Do not install MS13-036
      • My list of the top 3 free pieces of software.
      • What does it mean: Sandbox
      • Using Windows XP? Here comes the end.
      • What Does It Mean: Firewall
      • Haters Gotta Hate, Noobs Gotta Imitate.
    • ►  March (7)
    • ►  February (6)
    • ►  January (3)
Powered by Blogger.

About Me

Unknown
View my complete profile