Norman, a world leading company within the field of data security, internet protection and analysis tools issues warning over targeted email attacks against CEO, announces the Sourcewire.com.
CEO is asked to install a plug-in that is a trojan and takes over the victim’s computer.
How does that happen?
CEO receives emails from the "US District Courts in USA". The emails state that they are sued and in order to look at the court documents through they are asked to click the web. And the life of viruses starts. The threat seems of very low percentage as the email looks very realistic; to ensure the CEO about seriousness of the email it contains the correct name of the company, the correct CEO and might even contain the correct phone number. Later on the user appears not at the American Courts but to Jinan, China.
According to the SourceWire.com there is an increasing number of CEO that has been targeted using this "spear phishing attack" technique and that the apparent legitimacy of this document has meant that a number of executives have been tricked into installing the Trojan. Trygve Aasland, CEO of Norman ASA was one of the recipients.
"This email appears legitimate and the technique is clever in that most people will want to discover the details of why and by whom they are being sued, fortunately I am very much aware of these attacks and so we remained unaffected but I can see how others may have been tricked into opening the link and installing the so called plug in" Said Trygve Aasland, CEO, Norman ASA
Trojan was detected by Norman’s antivirus products through the unique Norman Sandbox technology.
In order to discover you are infected or not one should visit http://www.norman.com/, who will be happy to assist.
References:
http://www.sourcewire.com/releases/rel_display.php?relid=38311&hilite=
http://www.norman.com/
No comments:
Post a Comment