Fake emails saying US is bombing Syria lead to malware
Posted on 09.09.2013
Two distinct spam campaigns taking advantage of the current political situation in Syria have been spotted by Symantec and Kaspersky Lab researchers.

The first one consists of an email simply stating "Dear sir, please find the attachment", urging the user to open the chemical attack in Syria.doc file in the attachment.

The file contains a recent Washington Post article, but is also specially crafted to exploit a Microsoft Internet Explorer vulnerability (CVE-2013-2551) and, if successful, surreptitiously installs the Korplug Trojan onto the targeted machine, which then opens a backdoor into it and will likely lead to confidential information being exfiltrated by the attackers.

The second malicious email is even more dangerous, as it's made to look like it has been sent by the CNN and contains the claim that the US has already started bombing Syria (click on the screenshot to enlarge it):

"Clicking the shortened link will lead to an exploit kit which targets older, vulnerable versions of Adobe Reader and Java," Kaspersky Lab expert Roel Schouwenberg explained. "The attackers favor using the Java exploit over the Reader exploit, as Java exploits are generally more reliable."

The goal of the attack is to saddle the user with a Trojan downloader, which will subsequently download even more malware on the computer.

Attacks such as these are nothing new, as malware peddlers often use news of current events as a way to lure in the most curious of users. Syria-themed spam will likely be landing in users' inboxes for a while yet.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 4th