SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Web Threat Spotlight
A Web threat is any threat that uses the Internet to facilitate cybercrime.


                                                                                                                                        ISSUE NO. 65
                                                                                                                                         JUNE 7, 2010

                                                                              FIFA Spam Targets Football Fanatics
Football season is definitely upon us. Football fanatics worldwide are all set to cheer for their teams and to proudly display their colors. Even the
players are intensifying their training and solidifying their strategies. With just days left before the highly anticipated opening of the “Fédération
Internationale de Football Association (FIFA) 2010 World Cup,” the world can expect that even cybercriminals will step up their game.

The Threat Defined
Cybercriminals have long been leveraging sports events for their profiteering schemes. The list of such attacks
include those related to the “2008 European Soccer Championships”; the Pacquiao-Clottey boxing match; the “2010
Vancouver Winter Olympics”; and the upcoming “2012 London Olympics,” spam for which made the inbox rounds
four years before the actual event is even set to take place.
Riding on the popularity of sports events is a tried-and-tested technique that cybercriminals continue to use even
now. The “2010 FIFA World Cup” is no exception. In January 2009, an early 2010 FIFA spam tried to trick recipients
                                                                                    SM
into believing they won an online sweepstakes draw. More recently, TrendLabs           engineers encountered two
separate spam runs leveraging the upcoming “2010 FIFA World Cup.”
Two Players, One Goal
The first spam sample instructed
users to open and view a .DOC
file attachment to learn more
about     the   supposed     FIFA-
organized “Final Draw” contest’s
prizes. The file also informs the
recipients about a US$550,000
prize that seven lucky winners will
receive should their names be
drawn. To claim their prizes,
however, the “winners” must
immediately coordinate with a
releasing agent via the contact
information indicated in the email.
The said winners must also
provide the requested data, which
includes personally identifiable
information (PII) such as their
marital status, company name,
email address, and full mailing
                                                                         Figure 1. FIFA-related spam run infection diagram
address.
The second spam sample arrived with a .PDF file attachment, a poorly worded letter asking the recipients to divulge
specific information in relation to a supposed fund transfer transaction worth US$10.5 million. Upon agreeing to the
proposal, the recipients should supposedly get 30 percent of the said amount, reminiscent of the infamous 419 or
Nigerian scam, which persuaded users to send cash in exchange for a larger amount of money in return for their
cooperation.
The Laws of the Spamming Game
Over the years, spammers have been refining their techniques and been resorting to a variety of social engineering
tactics in order to trick users into clicking malicious links or into downloading malicious files. The most popular
spamming techniques include sending out medical or pharmaceutical ads, holiday-related messages, bogus email
notifications, and messages leveraging timely newsworthy events.




1 of 2 – WEB THREAT SPOTLIGHT
Web Threat Spotlight
A Web threat is any threat that uses the Internet to facilitate cybercrime.


Despite ever-evolving tactics, however, spammed messages exist for one reason alone, that is, to further
cybercriminals’ malicious schemes. The arrival of spammed messages in users’ inboxes alongside legitimate email
messages increases the probability that the recipients would open even the malicious mail. Furthermore, the
varying techniques spammers use to create malicious messages is an added challenge to users and security
experts alike when classifying messages.

User Risks and Exposure
The “2010 FIFA World Cup” is slated to open on June 11 in South Africa. Since this is the first time the games will
be held on African soil, it can be expected that football fanatics—and possibly even other Africans remotely
interested in the game—will constantly be on the lookout for news about the event. Add to this the fact that FIFA
games are mostly well attended. This year’s event has an expected audience of 3 million international visitors and
as many as 400 million live television viewers. While a good portion of these figures includes a chunk of the
265 million football players worldwide, it still cannot be denied that the “World Cup” does draw in a crowd.
Also noteworthy is the fact that the official “World Cup” site, fifa.com, has received a noticeable increase in hits
beginning April. Based on the site statistics, the top search queries include “FIFA” and “world cup 2010”—the same
keywords that spammers are using in related attacks. The numbers from Google Trends likewise show that interest
in the phrase “world cup” has increased by three times over the 2010 average as of this writing.
With millions of fans actively searching the Internet for more information on the “World Cup,” it is no surprise that
cybercriminals are likewise maximizing the Web to further their malicious activities. By consistently leveraging hot
topics, cybercriminals are likewise ensuring the continued profitability of their schemes.
This widespread attraction increases the potential harm that spammed messages leveraging the event pose. These
FIFA-related scams can already be considered part of football tradition, given the fact that they are a recurrent part
of the threat—and even the football landscape. In fact, even FIFA has issued a warning that fans should be wary of
email scams and Internet hoaxes.
While in both spam runs, the messages did not directly ask for cash, arrive with malware, or led to malicious sites,
they did pose identity theft risks to users. By requesting PII from the recipients, users’ private information and
security may be compromised.

Trend Micro Solutions and Recommendations
Trend Micro™ Smart Protection Network™ infrastructure delivers security that is smarter than conventional
approaches. Leveraged across Trend Micro’s solutions and services, Smart Protection Network™ combines unique
in-the-cloud reputation technologies with patent-pending threat correlation technology to immediately and
automatically protect your information wherever you connect.
In this attack, Smart Protection Network’s email reputation technology blocks all emails related to the spam runs.
The following post at the TrendLabs Malware Blog discusses this threat:
http://blog.trendmicro.com/latest-online-scam-targets-fifa-fans/

Other related posts are found here:
http://blog.trendmicro.com/spam-buys-tickets-to-euro-2008/
http://blog.trendmicro.com/pacquiao-clottey-live-streams-lead-to-fakeav/
http://blog.trendmicro.com/search-for-“winter-olympics”-and-take-your-pick—fakeav-or-bogus-windows-media-player-updates/
http://blog.trendmicro.com/a-very-early-london-olympics-scam/
http://blog.trendmicro.com/scammers-attempt-to-score-through-the-fifa-world-cup/
http://www.419scam.org/emails/2009-06/30/00934224.4.htm
http://blog.trendmicro.com/fake-pharma-ads-flood-inboxes-again/
http://blog.trendmicro.com/spammers-celebrate-mothers’-day/
http://blog.trendmicro.com/fake-it-email-notification-spreads-malicious-pdf/
http://blog.trendmicro.com/shanghai-expo-spam-carries-backdoor/
http://blog.trendmicro.com/category/spam/
http://www.southafrica.info/2010/worldcup-overview.htm
http://www.goal.com/en/news/1863/world-cup-2010/2010/05/29/1947801/world-cup-viewing-figures-prove-that-this-really-is-the-
http://www.fifa.com/worldfootball/bigcount/index.html
http://www.alexa.com/siteinfo/fifa.com
http://www.google.com/trends?q=World+Cup&ctab=0&geo=all&date=2010&sort=0
http://www.theregister.co.uk/2010/06/01/world_cup_net_threats/
http://www.fifa.com/worldcup/organisation/ticketing/authorisedticket.html
2 of 2 – WEB THREAT SPOTLIGHT

Weitere ähnliche Inhalte

Was ist angesagt?

2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013EMC
 
5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebookWilliam Grieve
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeSymantec
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
L Scope
L ScopeL Scope
L ScopeCTIN
 

Was ist angesagt? (9)

2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
5 ways criminals use facebook
5 ways criminals use facebook5 ways criminals use facebook
5 ways criminals use facebook
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud Landscape
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
L Scope
L ScopeL Scope
L Scope
 

Ähnlich wie FIFA Spam Targets Football Fanatics

A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesSejahtera Affif
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesSejahtera Affif
 
6204399 privacy on the internet
6204399 privacy on the internet6204399 privacy on the internet
6204399 privacy on the internetChiran27
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threatsmahesh43211
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sectorChristos Laganas
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011IbuSrikandi
 

Ähnlich wie FIFA Spam Targets Football Fanatics (20)

A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
 
6204399 privacy on the internet
6204399 privacy on the internet6204399 privacy on the internet
6204399 privacy on the internet
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
14 cyber threats
14 cyber threats14 cyber threats
14 cyber threats
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
Cyber security
Cyber securityCyber security
Cyber security
 

Mehr von Trend Micro

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesTrend Micro
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeTrend Micro
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Trend Micro
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaTrend Micro
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)Trend Micro
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksTrend Micro
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest TexasTrend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 

Mehr von Trend Micro (20)

Industrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, VulnerabilitiesIndustrial Remote Controllers Safety, Security, Vulnerabilities
Industrial Remote Controllers Safety, Security, Vulnerabilities
 
Investigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at LargeInvestigating Web Defacement Campaigns at Large
Investigating Web Defacement Campaigns at Large
 
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...Behind the scene of malware operators. Insights and countermeasures. CONFiden...
Behind the scene of malware operators. Insights and countermeasures. CONFiden...
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Mobile Telephony Threats in Asia
Mobile Telephony Threats in AsiaMobile Telephony Threats in Asia
Mobile Telephony Threats in Asia
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
AIS Exposed: New vulnerabilities and attacks. (HITB AMS 2014)
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

FIFA Spam Targets Football Fanatics

  • 1. Web Threat Spotlight A Web threat is any threat that uses the Internet to facilitate cybercrime. ISSUE NO. 65 JUNE 7, 2010 FIFA Spam Targets Football Fanatics Football season is definitely upon us. Football fanatics worldwide are all set to cheer for their teams and to proudly display their colors. Even the players are intensifying their training and solidifying their strategies. With just days left before the highly anticipated opening of the “Fédération Internationale de Football Association (FIFA) 2010 World Cup,” the world can expect that even cybercriminals will step up their game. The Threat Defined Cybercriminals have long been leveraging sports events for their profiteering schemes. The list of such attacks include those related to the “2008 European Soccer Championships”; the Pacquiao-Clottey boxing match; the “2010 Vancouver Winter Olympics”; and the upcoming “2012 London Olympics,” spam for which made the inbox rounds four years before the actual event is even set to take place. Riding on the popularity of sports events is a tried-and-tested technique that cybercriminals continue to use even now. The “2010 FIFA World Cup” is no exception. In January 2009, an early 2010 FIFA spam tried to trick recipients SM into believing they won an online sweepstakes draw. More recently, TrendLabs engineers encountered two separate spam runs leveraging the upcoming “2010 FIFA World Cup.” Two Players, One Goal The first spam sample instructed users to open and view a .DOC file attachment to learn more about the supposed FIFA- organized “Final Draw” contest’s prizes. The file also informs the recipients about a US$550,000 prize that seven lucky winners will receive should their names be drawn. To claim their prizes, however, the “winners” must immediately coordinate with a releasing agent via the contact information indicated in the email. The said winners must also provide the requested data, which includes personally identifiable information (PII) such as their marital status, company name, email address, and full mailing Figure 1. FIFA-related spam run infection diagram address. The second spam sample arrived with a .PDF file attachment, a poorly worded letter asking the recipients to divulge specific information in relation to a supposed fund transfer transaction worth US$10.5 million. Upon agreeing to the proposal, the recipients should supposedly get 30 percent of the said amount, reminiscent of the infamous 419 or Nigerian scam, which persuaded users to send cash in exchange for a larger amount of money in return for their cooperation. The Laws of the Spamming Game Over the years, spammers have been refining their techniques and been resorting to a variety of social engineering tactics in order to trick users into clicking malicious links or into downloading malicious files. The most popular spamming techniques include sending out medical or pharmaceutical ads, holiday-related messages, bogus email notifications, and messages leveraging timely newsworthy events. 1 of 2 – WEB THREAT SPOTLIGHT
  • 2. Web Threat Spotlight A Web threat is any threat that uses the Internet to facilitate cybercrime. Despite ever-evolving tactics, however, spammed messages exist for one reason alone, that is, to further cybercriminals’ malicious schemes. The arrival of spammed messages in users’ inboxes alongside legitimate email messages increases the probability that the recipients would open even the malicious mail. Furthermore, the varying techniques spammers use to create malicious messages is an added challenge to users and security experts alike when classifying messages. User Risks and Exposure The “2010 FIFA World Cup” is slated to open on June 11 in South Africa. Since this is the first time the games will be held on African soil, it can be expected that football fanatics—and possibly even other Africans remotely interested in the game—will constantly be on the lookout for news about the event. Add to this the fact that FIFA games are mostly well attended. This year’s event has an expected audience of 3 million international visitors and as many as 400 million live television viewers. While a good portion of these figures includes a chunk of the 265 million football players worldwide, it still cannot be denied that the “World Cup” does draw in a crowd. Also noteworthy is the fact that the official “World Cup” site, fifa.com, has received a noticeable increase in hits beginning April. Based on the site statistics, the top search queries include “FIFA” and “world cup 2010”—the same keywords that spammers are using in related attacks. The numbers from Google Trends likewise show that interest in the phrase “world cup” has increased by three times over the 2010 average as of this writing. With millions of fans actively searching the Internet for more information on the “World Cup,” it is no surprise that cybercriminals are likewise maximizing the Web to further their malicious activities. By consistently leveraging hot topics, cybercriminals are likewise ensuring the continued profitability of their schemes. This widespread attraction increases the potential harm that spammed messages leveraging the event pose. These FIFA-related scams can already be considered part of football tradition, given the fact that they are a recurrent part of the threat—and even the football landscape. In fact, even FIFA has issued a warning that fans should be wary of email scams and Internet hoaxes. While in both spam runs, the messages did not directly ask for cash, arrive with malware, or led to malicious sites, they did pose identity theft risks to users. By requesting PII from the recipients, users’ private information and security may be compromised. Trend Micro Solutions and Recommendations Trend Micro™ Smart Protection Network™ infrastructure delivers security that is smarter than conventional approaches. Leveraged across Trend Micro’s solutions and services, Smart Protection Network™ combines unique in-the-cloud reputation technologies with patent-pending threat correlation technology to immediately and automatically protect your information wherever you connect. In this attack, Smart Protection Network’s email reputation technology blocks all emails related to the spam runs. The following post at the TrendLabs Malware Blog discusses this threat: http://blog.trendmicro.com/latest-online-scam-targets-fifa-fans/ Other related posts are found here: http://blog.trendmicro.com/spam-buys-tickets-to-euro-2008/ http://blog.trendmicro.com/pacquiao-clottey-live-streams-lead-to-fakeav/ http://blog.trendmicro.com/search-for-“winter-olympics”-and-take-your-pick—fakeav-or-bogus-windows-media-player-updates/ http://blog.trendmicro.com/a-very-early-london-olympics-scam/ http://blog.trendmicro.com/scammers-attempt-to-score-through-the-fifa-world-cup/ http://www.419scam.org/emails/2009-06/30/00934224.4.htm http://blog.trendmicro.com/fake-pharma-ads-flood-inboxes-again/ http://blog.trendmicro.com/spammers-celebrate-mothers’-day/ http://blog.trendmicro.com/fake-it-email-notification-spreads-malicious-pdf/ http://blog.trendmicro.com/shanghai-expo-spam-carries-backdoor/ http://blog.trendmicro.com/category/spam/ http://www.southafrica.info/2010/worldcup-overview.htm http://www.goal.com/en/news/1863/world-cup-2010/2010/05/29/1947801/world-cup-viewing-figures-prove-that-this-really-is-the- http://www.fifa.com/worldfootball/bigcount/index.html http://www.alexa.com/siteinfo/fifa.com http://www.google.com/trends?q=World+Cup&ctab=0&geo=all&date=2010&sort=0 http://www.theregister.co.uk/2010/06/01/world_cup_net_threats/ http://www.fifa.com/worldcup/organisation/ticketing/authorisedticket.html 2 of 2 – WEB THREAT SPOTLIGHT