20 March 2012

Linkedin Email Scam Deposits Banking Trojan


Don't be too quick to make that connection! GFI Labs recently discovered a LinkedIn email phishing scam that installs the Cridex banking Trojan. 
The fake LinkedIn email looks like an authentic email reminder about pending invitations (click to enlarge): 
linkedin explpoit
The phishing scam shares the same IP address (41.64.21.71) as several recent BBB and Intuit spam runs.
The Cridex bot (Symantec), aka Cardep (Microsoft, Avast) or Dapato (Ikarus, Emsisoft, Kaspersky), was discovered in the wild in August 2011. It spreads through emailed or shared attachments. Once installed, the Trojan connects to a remote command and control (C&C) server. Then it injects itself into your Internet Explorer process, where it steals online banking credentials, email accounts, cookies, FTP credentials, and send them back to the C&C server...........

Click here to read more ...... 

Solutions : www.xcyss.in

No comments:

Post a Comment