Scammers take advantage of Epsilon data breach

Posted by   Virus Bulletin on   Apr 18, 2011

Trojan hidden as security tool for affected customers.

Scammers are currently taking advantage of the data breach that affected email security provider Epsilon recently, by creating a copy of Epsilon's website and claiming that people can download a 'security tool' that tells them whether they have been affected.

While far from the first time that hackers have obtained personally identifiable information, the attack on Epsilon made the headlines because of its size and the number of financial organisations affected - which raised concerns that the data could be used for targeted attacks such as spear phishing. Epsilon did not help its case by providing very little information about the attack, adding to the feeling of unease among its clients' customers.

Scammers are now playing on these concerns by creating a fake copy of the company's website, which claims to have a tool which users can download and use to determine whether their personal data has been stolen. Of course the 'tool' is, in fact, a trojan dropper, and when downloaded it infects the machine with malware.

Computer users have good reason to worry about leaked personal data, but they should not let these worries get in the way of acting responsibly when downloading files from the Internet. Companies that have been attacked by hackers have reason to worry about damage to their reputation, but they should be aware that by not being open about the attacks they can make matters worse both for themselves and for their customers.

More at Websense here.

Posted on 18 April 2011 by Virus Bulletin

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Security products and HTTPS: let's do it better

A recent paper showed that many HTTPS-intercepting security solutions have implemented TLS rather poorly. Does that mean we should avoid such solutions altogether?

The SHA-1 hashing algorithm has been 'shattered'

Researchers from Google and CWI Amsterdam have created the first known collision of the SHA-1 hashing algorithm, making a very strong case to ditch it.

Throwback Thursday: Once a researcher...

VB was saddened to learn this week of the passing of one of the pioneers of the AV industry, Ross Greenberg. This Throwback Thursday we look back at an interview with Ross in November 1995.

VB2017: What is happening in the threat landscape and what are we doing against it? Submit a proposal in the VB2017 CFP!

Have you analysed a new online threat? Do you know a new way to defend against such threats? Then submit an abstract in the CFP for VB2017!

VB2016 paper: APT reports and OPSEC evolution, or: these are not the APT reports you are looking for

APT reports are great for gaining an understanding of how advanced attack groups operate - however, they can also provide free QA for the threat actors. Today, we publish a VB2016 paper by Gadi Evron (Cymmetria) and Inbar Raz (Perimeter X), who…