Fake Kim Jong-il video distributing malware

Summary:Security researchers from ESET have spotted a fake YouTube video, distributing malware in the form of a link found in the description of the video.

Security researchers from ESET have spotted a fake YouTube video, distributing malware in the form of a link found in the description of the video.

Here's what happens once the user clicks on the link:

When the user starts the installation, an application is automatically copied to the computer before the browser download manager sees a new incoming file. This type of file usually contains, in addition to advertising tools, other types of threats such as spyware or bots. These threats typically gain entry to end-user systems through tempting offers that encourage users to download applications. In this case, the incentive is an offer of free access to popular television series and movies over the Internet.

During December, 2011, another Kim Jong-il themed client-side exploits serving campaign was circulating in the wild, clearly indicating that event-based social engineering attacks are here to stay.

Topics: Security, Malware

About

Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, and cybercrime incident response. He's been an active security blogger since 2007, and maintains a popular security blog sharing real-time threats intelligence data with the rest of the community... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.