Scam for Non-Profit Organizations Exploiting Barbara Moratek
Small organizations are being attacked by the new variants of 419 scams. Spams have been delivered to various non-profit organizations exploiting the name "Barbara Moratek". "Barbara Moratek" is believed as the director of the grant programs being run by a group known as the Ivete Foundation, as per the news published by Vnunet on January 14, 2008.
Cyber attackers, who are managing the attack of Barbara Mortek, are aiming to bring a link to a counterfeit video websites on Digg. The attackers are putting in every effort to exploit social engineering sites, disrupt search engines, manipulate news and blogging websites, register bogus domain names, and obtain web hosting to achieve their goal of pilfering money.
According to Sunbelt Software, a security firm, the e-mail looks for the information about volunteers and donors and also asks for processing fee. The objective behind asking this information could be organizing financial scams. The e-mail encloses a question about the prospective volunteers and donors apart from those who are mentioned on the website.
Alex Eckelberry, Chief Executive at Sunbelt, said that he felt annoyed to see remarks from non-profits organization, which had been attacked by this attempt. Its pity that attackers are targeting those who are helping others with money, as reported by Vnunet on January 14, 2008.
When Ivete Foundation's website is searched, the web page emerges contain a message "coming soon" and when the Google search is done for term "Barbara Moratek", a group of counterfeit codec malware websites opens.
Sunbelt perceives that the motive behind this act is to monetize the scam. It is possible that malware websites take undue advantage of this name, as more people use this term to get more information by inserting search term "Barbara Moratek". These sites can buy this keyword or acquired "zeitgeist" key words, which mean loading websites with hot keywords and then attracting people to the sites.
Security experts at Trend Micro warned to not to track such kind of link as they would be unsafe. The path of bouncing malware redirects bounds the victim to download Zlob binary, which is cloaked as an ActiveX control.
Related article: Sixem Worm Striking World Cup
» SPAMfighter News - 28-01-2008