SHARE
Facebook X Pinterest WhatsApp

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users

GFI Software recently released its VIPRE® Report for March 2012, a collection of the 10 most prevalent threat detections encountered during the last month. GFI Labs documented several spam attacks and malware-laden email campaigns infiltrating users’ systems under the guise of communications purporting to be from well-known companies and promotions for popular products and services. […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Apr 3, 2012

GFI Software recently released its VIPRE® Report for March 2012, a collection of the 10 most prevalent threat detections encountered during the last month. GFI Labs documented several spam attacks and malware-laden email campaigns infiltrating users’ systems under the guise of communications purporting to be from well-known companies and promotions for popular products and services. Google™, LinkedIn®, Skype™ and the video game Mass Effect™ 3 were among the brands exploited by cyber criminals in order to attract more victims.
“Taking advantage of the notoriety of companies, celebrities and major events is a tactic cyber criminals continue to use because it works,” said Christopher Boyd, senior threat researcher at GFI Software. “They know that Internet users are bombarded with countless emails every day, and these scammers prey on our curiosity and our reflex-like tendency to click on links and open emails that look like they’re coming from a company we know and trust.”
Google served as the hook for two particularly nasty scams uncovered by GFI in March. One SEO poisoning attack told users that “Google systems” had detected malware on their computer and directed them to download a rogue antivirus application. Meanwhile, spammers inundated mailboxes with messages containing fake announcements for “Google Pharmacy,” a phony service touted as a “pharmaceutical interface for Google.” The body of the email consisted of a single image rather than text in order to circumvent spam filters. Victims who visited the URL contained in the image spam were directed to Pharmacy Express, a site linked to spam attacks since 2004.
Users of popular social networking site, LinkedIn, received fake invitation reminders redirecting them to a BlackHole exploit and infected their machines with Cridex, a Trojan that has targeted banks, social networks and CAPTCHA tests. Other cyber criminals targeted Skype users with a spam campaign claiming to offer free Skype credit, but instead, directed users to a compromised site hosting malicious Java exploits.
Finally, March has been awash with scams and cyber crime efforts revolving around the launch of Mass Effect 3, one of the most eagerly awaited games of the year so far. Among them, GFI Labs covered reports of users being duped with fake alternative ending downloads for the game, taking advantage of the well-publicized intention of the game's maker to clarify the ending, which has been broadly discussed online. The fake downloads eventually lead users to a myriad of fake surveys and other affiliate marketing scams.
“If something seems off, users should trust their instincts and investigate further,” continued Boyd. “The important thing for everyone to remember is that the Internet provides us with the ability to easily double check every link or attachment that we come across with a simple web search. Pay attention to details such as link URLs and scrutinize where they are directing you if there is any doubt. This may sound like common sense, but having this mind set can often be the difference between avoiding a stressful attack and losing valuable time, money and personal information.”

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 1

Click through for the top 10 threat detections for March 2012, as identified by GFI Labs.

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 2

Trojan.Win32.Generic —Trojan

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 3

GamePlayLabs— Browser Plug-in

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 4

Yontoo — Adware

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 5

INF.Autorun (v) — Trojan

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 6

Trojan.Win32.Ramnit.c (v) — Trojan

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 7

Worm.Win32.Downad.Gen (v) — Worm.W32

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 8

Virus.Win32.Sality.at (v) — Virus.W32

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 9

Trojan-Spy.Win32.Zbot.gen — Trojan

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 10

Exploit.PDF-JS.Gen (v) — Exploit

Cyber Criminals Targeting High-Profile Brands and Keywords to Undermine Users - slide 11

iBryte — Adware (General)

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.