Read

User menu

Search form

Techtivist Report: Beware the Spy in Spam

Techtivist Report: Beware the Spy in Spam
Thu, 3/21/2013 - by Conrad Jaeger

Pope Francis had barely donned his new white robes before cybercriminals were targeting his flock with spam emails and social media posts in a bid to suck money out of their bank accounts. But it’s not just the spammers who make use of these tricks and tools. Increasingly, intelligence agencies are preying on the gullibility of activists.

Emails purporting to be from CNN with enticing headlines linking the new Pontiff to child sex abuse rapidly drew a lot of concerned Catholics and others to spoof websites compromised by Blackhole Exploit Kits. Unwittingly, many then fell victim to remote access Trojans, backdoors, infostealers and rootkits.

The new Pope is in good company. In the past, cybercriminals have lured the unsuspecting with lurid tales of Justin Bieber’s sex life and the death of Jackie Chan.

The term for this type of scam is "social engineering," broadly defined as the act of tricking people into giving out confidential information or unwisely opening themselves to infection. Cyber criminals make the most of news events and consumer trends by enticing users to infected websites or by planting malware in their system via email.

When activists in Bahrain recently began receiving emails with suspicious attachments, they passed them on to journalists at Bloomberg who then had them analyzed. Hidden inside they found FinSpy, a nasty piece of malware designed to take control of phones and computers from afar.

“FinSpy can be sent to people in spoof emails to secretly monitor their computers – intercepting Skype calls, turning on web cameras and recording every keystroke,” Bloomberg told its readers.

The U.K.-based Gamma Group markets FinSpy directly to law enforcement and intelligence agencies but denies selling to Bahrain, saying someone else must have duplicated the program and sold it to the repressive Gulf state.

Meanwhile, FinSpy has been discovered running on servers in 25 countries, according to researchers at the University of Toronto’s Munk School of Global Affairs’ Citizen Lab.

For the alarm to have been raised in the first place, the Bahrain activists may have been alerted by a simple anti-virus program that warned they were being diverted to a malicious website.

To guard against these attacks, a safe option is to use a combination of standalone security software with one firewall, one or two anti-virus programs, and one or two anti-spyware programs, plus dedicated anti-Trojan software. Avoid running them all in ‘real-time’ to avoid software conflicts and, instead, regularly scan the computer and update manually.

To avoid infection via email, disable HTML in the email program via the Settings tab. Look for and untick Display attachments inline or tick View message body as plain text. Never open attachments or click on links if you are unsure of their origin. Equally, be aware of social media posts with enticing links.

Among the most dangerous forms of malware are Key Stroke Logging programs and, in extreme cases, tiny hardware versions that can be hidden inside the computer. These work by logging every keystroke and mouse movement. KeyScrambler offer several solutions, including a free option, to scramble keystrokes and defeat surveillance.

As a rule, free, open-source software is preferable to the paid-for variety because developers and others can have a good look inside for backdoors and other things that should not be there.

Comodo Personal Firewall, free and paid-for versions of combined anti-virus and firewall programs. It protects against viruses, Trojans, worms, hacker attacks and other threats.

Lavasoft’s Ad-Aware, free and paid-for versions. Provides core protection against Internet threats. Featuring real-time anti-malware protection, advanced Genocode detection technology, rootkit protection and scheduler.

Spybot Search and Destroy, free, fully functioning privacy and anti-malware software.

AVG Anti Rootkit, removes Rootkits, a malicious program somewhere between a virus and Trojan horse which open computers to external attack.

Avast Free Antivirus, full-featured software with the same antivirus and anti-spyware scanning engine used in Avast’s premium products.

AVG Anti-Virus Free Edition, probably best of the bunch when it comes to free anti-virus software.

Read more by Conrad Jaeger at Techtivist.com and follow him at @conradjaeger.

3 WAYS TO SHOW YOUR SUPPORT

ONE-TIME DONATION

Just use the simple form below to make a single direct donation.

DONATE NOW

MONTHLY DONATION

Be a sustaining sponsor. Give a reacurring monthly donation at any level.

GET SOME MERCH!

Now you can wear your support too! From T-Shirts to tote bags.

SHOP TODAY

Sign Up

Article Tabs

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

The Florida governor’s humiliating loss has a dark undertone: Most Republicans, and many independents, apparently have a craving for the unchecked lawless vengeance that Trump has promised if he wins a second term.

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

The Florida governor’s humiliating loss has a dark undertone: Most Republicans, and many independents, apparently have a craving for the unchecked lawless vengeance that Trump has promised if he wins a second term.

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.

Posted 3 weeks 3 days ago

Trump’s brand of hyper-nationalism combined with the intense consolidation of executive power follows the same playbook as fascistic leaders in other countries like India,Russia, Hungary, Turkey, Egypt, Italy and Argentina, among others.

Posted 1 month 3 weeks ago
Donald Trump, Hitler

Like Hitler, Trump has a unique command of propaganda, a captivating public presence, and he knows how to drive home narratives beneficial to him and harmful to his enemies.

Posted 1 month 1 week ago

What remains unknown is whether post-truth Republicans will succeed in 2024 as the Nazis did in 1933.

Posted 1 week 2 days ago

Based on details that have emerged about Trump’s presidential agenda, the far-right Heritage Foundation plans for the next GOP president to have all the tools necessary to demolish multicultural democracy and establish a white, Christian ethnostate that imposes a gender apartheid not unlike the Taliban’s Afghanistan.