Bhutto assassination brings out worst in hackers

Within hours of last month’s assassination of former Pakistani Prime Minister Benazir Bhutto, malware makers exploited the breaking news to dupe users into downloading attack code, security researchers said.

Searches for news about Bhutto’s killing and the ensuing chaos in Pakistan listed sites pimping a bogus video coder/decoder (codec), said analysts at McAfee Inc., Symantec Corp. and WebSense Inc.

For instance, WebSense found such a site simply by using “benazir” to search on Google. Meanwhile, McAfee quickly located 10 sites hosted on Blogger.com, Google Inc.’s blog service, that were spreading the fake codec.

The sites use the well-worn tactic of promising a video — in this case one of Bhutto’s assassination — but telling Windows users that they need to install a new high-definition video codec, the program that decodes the digital data stream, to view the clip. Naturally, the so-called codec is no such thing, but is instead rigged code that downloads a variant of the Zlob Trojan horse, a back door that can infect the compromised PC with a wide range of other malware.

“Even death isn’t sacred to some,” said Symantec researcher Vikram Thakur in a post to the company’s security response blog.

Other hackers are relying on the news of Bhutto’s assassination to draw users to sites that forgo the codec angle and instead conduct drive-by attacks, said Rahul Mohandas, a security analyst at McAfee’s Avert Labs unit.

“There are a plethora of sites which attempt drive-by installations when unsuspecting users visit search-engine results for ‘Benazir Bhutto,'” said Mohandas in a post to the Avert Labs blog. “Many of these compromised pages have malicious scripts, which point to the 3322 domain. These pages contain obfuscated variants of the MS06-014 exploit, which is perhaps one of the most popular of all the exploits we see on a daily basis.”

MS06-014, issued in April 2006, patched a critical vulnerability in an ActiveX control that is part of Microsoft Data Access Components (MDAC), which are packaged with Windows XP and Server 2003.

Shilling bogus codecs is a popular pastime of attackers. The technique has been used to plant malware on PCs from singer Alicia Keys’ MySpace page, for example, and was the vector used by hackers who went after Macs in November.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now