Cyber-Criminals Post Bogus Videos on Facebook Accounts for Disseminating Trojan
BitDefender the security company is warning of cyber-criminals who're attempting at duping people into planting malware and thus infecting their PCs with a Trojan as the crooks send bogus Facebook messages supposedly from buddies on the victims' contact lists.
The company explains that the messages sent display phrases such as "XXX private video," "[user name] naked video" else "[user name] private video." In place of 'user name' a friend's name of the recipient is mentioned.
Reportedly, on clicking the web-links inside these messages, users are led onto one phony YouTube site, which seemingly exhibits the mentioned movie clip. But, an instruction directs them towards making the Flash Player from Adobe on their systems up-to-date so they can view the content.
Moreover, in reality, the update to Flash Player happens to be a Trojan that BitDefender has identified as Trojan.FakeFlash.A (Trojan.GenericKD.1571215). This Trojan plants an extension of certain Web-browser, which compromises the victimized user's Facebook A/C for subsequent theft of his photo while also proliferate the scam image messages further. Unfortunately, these scam messages attract the notice of the victims' unsuspicious pals.
The cyber-criminals also try and give an authentic touch to their scam so they mention a false number of attempts that watched the adult movie. More than 2m users have apparently followed the Trojan-carrying fake YouTube web-link. Furthermore, the malware controllers incorporated another missive that only people of certain age could view the movie according to "Community Guidelines," yet another effort for adding credibility.
Additionally, the date of posting the rouge movie is falsified to appear as current. Over the past 2-yrs-or-so phony Flash Player loaders are continuously contaminating people's accounts on Twitter and Facebook.
Security experts at BitDefender state that the latest mischievous Trojan has emerged only recently; however, it has by now struck many countries like, USA, UK, Germany, France, Italy and Romania.
Meanwhile, for remaining safe from the above scam, users are suggested to load a vibrant anti-virus program, which stops drive-by downloads from harming their Web-browsers. Moreover, rather than following web-links, they must directly visit Adobe's authorized website at http://get.adobe.com/flashplayer/ for accessing and loading the Flash Player update.
» SPAMfighter News - 13-03-2014