Cybercriminals use non-existent ‘Clinton, IS money swap’ video to spread virus
Source: Hindustan Times (India)
Cybercriminals are using a non-existent video that claims to show Democratic Party presidential nominee Hillary Clinton exchanging money with an Islamic State (IS) leader to distribute malicious spam emails.
The emails subject announces Clinton Deal IS Leader caught on Video.
There is no video in the email which contains Adwind cross-platform remote access Trojan, global cyber security leader Symantec alerted on Thursday.
The email also discusses voting and asks recipients to decide on who to vote [for] after watching the non-existent clip.
Read more: http://www.hindustantimes.com/india-news/cybercriminals-use-non-existent-clinton-is-money-swap-video-to-spread-virus/story-toLbqoH712HpbTCyDfwE4O.html
Friend or Foe
(195 posts)But, discerning users of the intertubes are just that way. Trumpians, on the other hand, or, Brietbartians, might fall for these schemes. There's only so many ways you can separate those rubes from their rubles.
TygrBright
(20,753 posts)ffr
(22,665 posts)You could potentially do this for any number of the RW hoaxes. Simply play on tabloid style headlines and let the viruses eliminate the RW tool.
Why didn't I think of that!?
csziggy
(34,131 posts)<SNIP>
This remote admin tool is installed in a client machine and serves as an administration console to manage incoming connections from the servers to gain full access of the compromised system. The servers are compiled on the client machine using this tool and are deployed to remote hosts. Once the server is installed on the remote host, it will make a connection back to the client machine, thus resulting to remote access to the system.
https://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=27106
So those anxious to discover dirt on Hillary Clinton can find themselves with really screwed up computers.
Bless their hearts.
ThoughtCriminal
(14,046 posts)Need a gullible target.