Fake security blogs lead to malware

Posted by   Virus Bulletin on   Feb 4, 2008

Blogger sites play on fears to draw victims to porn, trojans.

According to a report from Aladdin, numerous fake security blogs have been set up on the Google-owned Blogger blogging system, some carrying security news items taken from other sites including Aladdin's own website, and all redirecting to unrelated content, with porn and rogue anti-malware software on offer as well as exploits aiming to infect systems with trojans.

'The use of security-related content is clearly designed to draw traffic to the sites, targeting more alert users who monitor developments in the security world to ensure they keep informed about, and protected from, the latest threats,' said John Hawes, Technical Consultant at Virus Bulletin. 'In this case, the stolen news stories seem to have backfired somewhat by attracting unwanted attention from security firms, who will now surely pay close attention to protecting users from the threats being pushed by these sites, and work extra hard to get them blocked or taken down.'

More details of Aladdin's findings are on their research team's blog here, with more coverage in a Network World piece here.

Posted on 04 February 2008 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

$150k in cryptocurrency stolen through combined BGP-DNS hijack

A BGP hijack was used to take over some of Amazon's DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service.

Security-focused routers may help to mitigate IoT threats

Various security companies are offering security-focused routers. This is a good trend and may help mitigate a lot of the issues that come with the IoT.

The road to IPv6 is generally smooth but contains a few potholes

Most of the switch from IPv4 to IPv6 will happen seamlessly. But we cannot assume it won't introduce new security issues.

New paper: Powering the distribution of Tesla stealer with PowerShell and VBA macros

Since their return four years ago, Office macros have been one of the most common ways to spread malware. Today, we publish a research paper which looks in detail at a campaign in which VBA macros are used to execute PowerShell code, which in turn…

VB2017 paper: Android reverse engineering tools: not the usual suspects

Within a few years, Android malware has grown from a relatively small threat to a huge problem involving more than three million new malware samples a year. Axelle Apvrille, one of the world's leading Android malware researchers, will deliver a…