Spamvertised 'You have received a gift from one of our members!' malware campaign


MXLab.eu is reporting on a currently spamvertised malware campaign dropping Backdoor.IRCBot which, once executed, opens a connection back to an IRC (Internet Relay Chat) server, allowing the botnet masters easy of control.

MXLab 에서는 IRC 서버를 접속하여 크래커의 명령을 받아 행동하는 IRCBOT 백도어를 다운받는 광고스팸 Malware를 보고하였습니다.

Sample messsage:

메일 내용 예문

Hello friend !You have just received a screensaver from someone who really cares about you!This is a part of the message:“Hi there! It has been a very long time since I haven’t heared anything from you! I hope you enjoy this gift from me that i’ve sent with love … I’ve just found out about this service from Sharon, a friend of mine who also told me that…”If you’d like to see the rest of the message click here to receive your 3d live Dolphins===================Thank you for using www.freeze.com ‘s services !!! Please take this opportunity to let your friends hear about us by sending them this screensaver from our personal collection !==================

안녕, 너는 널 걱정하는 한 친구로 부터 화면보호기를 받았어. 이것은 친구 메세지의 일부야. "안녕 친구, 소식을 듣지 못한지 오래됬구나, 나는 너가 나의 사랑이 담긴 선물에 만족하길 빌어. 이건 샤론이라는 한 서비스에서 찾았어, 꼭 답장해주길 바래. "만약 3D 돌고래 그림을 클릭하면 나머지 부분의 편지를 볼 수 있습니다"===== www.Freeze.com의 서비스를 이용해주셔서 감사합니다. 당신의 친구가 보낸 화면보호기를 다운받아보시기 바랍니다.

From a social engineering perspective this is a — thankfully — badly executed campaign lacking basic quality assurance elements typical for social engineering campaigns such as timing — see the Xmas photo — which could have contributed to a better infection rate.

이러한 사회공학기법은 불행하게도 (사실은 감사하게도) 특정 기념일에만 전파되어 피해율을 높이는 다른 말웨어와 달리 기본적인 요소가 많이 부족합니다. 

It seems though the the ubiquitous “You’ve received a screensaver” social engineering campaign is still favored by novice botnet masters

이러한 기법은 아주 흔한 기법이지만, 아직까지도 초보 크래커들이 여전히 선호하고 있습니다. 

원문 : http://www.zdnet.com/blog/security/spamvertised-you-have-received-a-gift-from-one-of-our-members-malware-campaign/8250?tag=content;search-results-river

+ Recent posts