UPDATED 12:12 EDT / OCTOBER 12 2012

NEWS

Scammers Exploit Obama vs. Romney Campaigns to Deliver Malicious Sites

We all are pretty much excited about the November 6th elections and the presidential campaigns going on. But looks like few people are banking on these for their own benefits. Who else these can be? Cybercriminals and scammers! As the much watched Obama Vs. Romney presidential race is heating up, cybercriminals are trying to tap the opportunity as much as they can, and using the same as a bait to hit malicious sites. A recent study by Trend Micro has revealed that a large number of election-related keywords are sending several hits to malicious sites, out of which some of the data is below:

Keywords No. of Hits
Obama – 26,559
Romney – 4,519
Elections – 806
2012 Elections – 358

All these figures are from the past three months, and it is easy to guess that these are going to multiply soon. But what’s more interesting amid all this chaos is the number of hits for each candidate. When it comes to the number of failed attempts to access a malicious site, Obama gets the users’ vote. And cybercriminals agree: when we checked the number of unique domains blocked since January, there were 4 Obama-related domains for every 1 Romney domain.

Most of the victims of the scammers are people from United States and Canada. Majority of the hits are from disease vector URLs and spam-related, which was consistent with previous election-related threats.

Besides, some malware have also been discovered taking advantage of Presidential elections. These include ADW_MARKETSCORE, Romney V. Obama Tax Policies.pdf, HEUR_PDFEXP.E, SOHANAD worm, WORM_VOBFUS.SMAC, WORM_VOBFUS.RU, WORM_MSIL.BR, and WORM_SILLY.SS.

Of course, this is not uncommon as we always had similar attacks coming our way. Last month, Symantec published a warning on their site about a new malware found wreaking havoc on mobile devices owned by women, specifically those looking for a wealthy partner. Symantec discovered Android.Loozfon, a rare form of malware that has a specific target – females with Android devices. Loolzfon steals data from the compromised device such as contact details stored on the device as well as the phone number of the device. The point of which is, the more contact numbers and e-mail addresses the criminals acquire, the more people they can infect. The data acquired can also be sold to other spammers.

Then of course, we have the instance of London Olympics 2012 that was actively targeted by spammers with messages including anything right from prize and free tickets in exchange for your information, malware disguised as prize notification, or request to contact specific people.


A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.