Stratfor clients now targeted with malware
Posted on 14.02.2012
Bookmark and Share
The customers of Stratfor, a US-based research group that provides geopolitical analysis to government organizations and major corporations, are being targeted once again with malicious spam emails.

Following the December breach of the company's servers by Anonymous and the stealing of names, home addresses, credit card details and passwords of its clients, those very clients began to receive spear-phishing emails purportedly being sent by Stratfor CEO George Friedman, asking them to fill out an attached document with personal information.

This time around, the emails appear to be sent by a Stratfor admin, who first warns clients not to open emails and attachments from "doubtful senders", and then urges them to download an (attached) security software to check their systems for a nonexistent piece of malware:


"The link displayed in the emails appears legitimate at first glance, but looking closely at the target address, you notice that it doesn't originate from the address in the email text," says Microsoft. "Stratfor is based in Texas, United States however the download URL is located somewhere in Turkey. A sample of another PDF file contained a download link for yet another compromised site, this time in Poland."

Less careful users will, unfortunately, end up with a malicious PDF file or a variant of the Zbot information stealer Trojan on their systems.






Spotlight

Identifying security innovation strategies

Posted on 14 April 2014.  |  Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future threats.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Apr 16th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //