• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware   »   Malware Watch: Obama ‘Impeachment’ Spam

Malware Watch: Obama ‘Impeachment’ Spam

  • Posted on:November 10, 2008 at 11:31 pm
  • Posted in:Malware, Spam
  • Author:
    Bernadette Irinco (Technical Communications)
0

U.S. President candidate John McCain plans to impeach president elect Barack Obama, at least according to the latest post-election spam spotted today. Here’s a screenshot of the sample email message:

Figure 1. Politically-tinged spam email just keeps coming

Our researchers have seen the following subject lines containing the same text as the above:

  • Barack Obama in Danger – McCain will fight for the president post
  • McCain Lawmakers Impeach Obama
  • The impeachment of new president Obama
  • Barack Obama can lost President’s Chair.
  • POLITICAL STRIKE TIES
  • McCain Lawyers Want to Stop Obama

This is to rouse the curiosity of users into clicking the link that connects to several malicious Web sites. When users access the sites, a bogus US government official website is displayed. It presents a fake video (actually an image) and tricks the user into downloading a fake Adobe Player installer from a URL ending in AdobePlayer9.exe. Trend Micro detects this file as TROJ_PACKED.JFP. It drops and executes TROJ_ROOTKIT.FX. Smart Protection Network also blocks users from accessing the malicious links in the spam, the fake video, and the URL from which the executable is downloaded.

Election-related spam in the last week:

  • U.S. Presidency Race Ends, New Spam Run Begins
  • More Google Searches Resulting in Rogue AV
  • Post-Election Spam Leads to Fake Pharma
  • Obama Malware Spam Targets Latin America
Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: Barack ObamaelectionsfakeimpeachmentJohn McCainMalwarepoliticsSpamTrojan

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.