Fake Kim Jong-il video distributing malware

Security researchers from ESET have spotted a fake YouTube video, distributing malware in the form of a link found in the description of the video.

Security researchers from ESET have spotted a fake YouTube video, distributing malware in the form of a link found in the description of the video.

Here's what happens once the user clicks on the link:

When the user starts the installation, an application is automatically copied to the computer before the browser download manager sees a new incoming file. This type of file usually contains, in addition to advertising tools, other types of threats such as spyware or bots. These threats typically gain entry to end-user systems through tempting offers that encourage users to download applications. In this case, the incentive is an offer of free access to popular television series and movies over the Internet.

During December, 2011, another Kim Jong-il themed client-side exploits serving campaign was circulating in the wild, clearly indicating that event-based social engineering attacks are here to stay.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All