Kate and William's baby presents royal opportunity for spammers

Share this article:

It's a virus.

The arrival of the royal baby on Monday – and the gluttonous news coverage and public interest that has surrounded it – was not lost on cyber criminals.

According to security firms Websense and Kaspersky Lab, online vandals wasted little time in capitalizing on the occasion by spreading malicious spam.

One such campaign involved at least 60,000 phishing messages that contained the enticing subject line, "The Royal Baby: Live Updates," and masqueraded as a ScribbleLive update from CNN. The email body contained a link that claimed to lead to a hospital cam, but actually directed users to the BlackHole exploit kit, a crimeware application that takes advantage of commonly unpatched vulnerabilities on victims' computers, distributed via drive-by download.

"The campaigns detected so far are utilizing email lures, which either redirect unsuspecting victims to BlackHole exploit kits URLs or, indeed, provide malicious attachments in the form of Windows SCR files in an attempt to dupe users," according to Websense. "These kinds of threats are often launched when topical or global news stories develop."


Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.