Olympic spam carries malicious code: MessageLabs

Share this article:
A legitimate attachment containing information about security for the upcoming Beijing Summer Games is also masking a trojan, researchers at MessageLabs said.

The documents, which appear to come from Olympic mail servers, but include embedded malware, are so relevant to the recipient that researchers have noticed many victims are forwarding the malicious messages on to other Olympic committee members.

“These are otherwise perfectly valid documents,” Maksym Shipka, senior architect at MessageLabs, told SCMagazineUS.com today. “It's real information. It's a continuation of actual email conversations. Yet the document is bad.”

Opening the attachment activates a difficult-to-detect exploit in Microsoft Word, according to MessageLabs. The document silently extracts and runs the malicious code on the end-user's computer.

Social engineering is one of the most dangerous trends in spam. Messages are tailored to behavioral patterns of the users. Because the attachment is an actual, known document from a trusted sender, the user is tricked into thinking it is safe.

Shipka said the social engineering of this attack has been so precise, the target was compelled to not only open the attachments, but also to pass it on to other Olympic committee members. This marks the first time that such an outcome was intended by the attackers, he said.

Socially engineered attacks make it  difficult to tell the difference between what is safe and what is dangerous, meaning that users must now be more vigilant before opening or forwarding any email attachment, Shipka said.
Share this article:

Sign up to our newsletters

More in News

DDoS attacks remain up, stronger in Q2, report says

DDoS attacks remain up, stronger in Q2, report ...

Prolexic's second quarter DDoS report noted the proliferation of shorter attacks that ate up more bandwidth.

Superman soars above fellow superheroes as most toxic search term

A McAfee study found that searches pertaining to Superman exposed users to the most infected websites.

Black Hat talk on Tor weaknesses canceled

Black Hat organizers say legal counsel for the Software Engineering Institute and Carnegie Mellon University nixed the session.