The Beastie Boys Malware
The recent sad news of the passing of Adam Yauch of the Beastie Boys was tragic news to the music community. His unfortunate passing has triggered cybercriminals to develop malware and capitalize on his death for their own reasons.
As a Beastie Boy fan, this is very disturbing, however I’m not the least bit surprised as this is typical behavior for cybercriminals to act on and to benefit themselves.
IT Support providers and IT departments are looking to educate their users and clients to be wary of such articles circulating in Adam Yauch’s name where the malware exists.
Securitynewsdaily.com discusses more about the email circulating with Malware regarding Adam Yauch’s death:
The May 4 death of Beastie Boys member Adam Yauch sent a wave of sadness and shock through the music community, but while the world still mourns the loss of the talented and prolific musician and activist, soulless cybercriminals have begun capitalizing on the tragedy for their own selfish and illegal gains.
Trend Micro researchers detected a cybercrime campaign that has been spreading since last week, attempting to lure unsuspecting recipients into downloading what they believe is a news story about Yauch’s involvement with the International Campaign for Tibet (ICT), a nonprofit that promotes freedom for Tibetans.
The emails appear to be from the ICT, and show a picture of Yauch with the Dalai Lama beneath a title that reads, “ICT mourns the passing of Adam Yauch.” Embedded in the message is a link to a Microsoft Word document that supposedly includes the ICT’s complete reaction to Yauch’s untimely death.
As the ICT’s legitimate website explains, Yauch, also known by his stage name “MCA,” was an ICT board member and advocate; as a founding member of The Milarepa Fund, Yauch put on the 1996 Tibetan Freedom Concert to raise money and awareness of the Tibetan movement to gain independence from Chinese rule.
So there’s an air of authenticity to this scam, but don’t let it fool you: The attached Word document, Trend Micro discovered, is a Trojan file that, immediately upon opening, attempts to connect to URLs in order to download malicious files onto your computer before deleting itself.
The take-home message is that even — or especially — in the wake of tragedy, cybercriminals often go to work to prey on the public’s curiosity and interest. Keep yourself safe by avoiding suspicious websites, and don’t download any attachments unless you’re sure they are legitimate. And always run strong ant-virus software on your computer to help keep threats like these at bay.
Written by IT Management and Consulting Professionals at FedSolutions. Thanks for stopping by!