Trojan-Elect: Obama-Spam Inaugurates Malware Attack

Even as the election results are still warm, a new Obama-related Trojan began running up a tally in the tens of millions of copies distributed -- and hundreds of thousands of newly infected computers.

Keith Ferrell, Contributor

November 6, 2008

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Even as the election results are still warm, a new Obama-related Trojan began running up a tally in the tens of millions of copies distributed -- and hundreds of thousands of newly infected computers.The new Trojan is spreading by mass-spams promising exclusive election video and other inside information.

Noting Obama-spam numbers exceeding ten million within hours of the election, Cloudmark observes that the sites promising to show Obama video are located in Slovenia, among other overseas locations.

This Sophos blog includes examples of the spam and the malware links they include.

Websense's warning includes reminders of the "you must download Adobe Flash" come-one typical of many malware attacks.

None of this is unexpected -- as we've often discussed here, headlines drive spamlines.

But as the transition progresses toward the inauguration, it's likely that Obama-related attack vectors will be pursued even more aggressively; good time to warn your employees to steer clear of any unsolicited e-mails, and never to click video links in any mail and absolutely never to accept "invitations" to download up-to-date players and other add-ons lest they add Trojans to your network.

Read more about:

2008

About the Author

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights