DarkFiber Consulting – IT Managed Services

Montgomery County Animal Shelter Search Engine Poisoning Campaign

October 14th, 2009 . by DarkFiber Consulting

DarkFiber Consulting is aware of public reports regarding a search engine result poisoning campaign affecting search results for the Montgomery County Animal Shelter. Users seeking details on rumors about the closure of a “Montgomery County Animal Shelter” may be led to click on illegitimate search results which attempt to download malicious code. The rumors are being spread via e-mail, forums, and social networking sites, usually taking the form of a plea for readers to contact the shelter and adopt animals prior to the shelter’s closing.

DarkFiber Consulting is monitoring the situation and will provide updates as they become available.

Malware Spreading via Social Networking Sites

December 8th, 2008 . by DarkFiber Consulting

DarkFiber Consulting is aware of public reports of malware spreading via popular social networking sites. The reports indicate that this malware is spreading through spam email messages appearing to come from Myspace.com, Facebook.com, and Classmates.com. The email contains a message indicating that there is a YouTube video available and instructs the user to follow the link to view the video. If users click on this link, they will be prompted to update Adobe Flash Player. This update is not a legitimate Adobe Flash Player update–it is malicious code.

DarkFiber Consulting encourages users and administrators to do the following to help mitigate the risks:

  • Install antivirus software and keep the virus signatures up to date.
  • Do not follow unsolicited links.
  • Use caution when downloading and installing applications.
  • Obtain software applications and updates directly from the vendor’s website.
  • Configure your web browser as described in the Securing Your Web Browser document.
  • Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams.
  • Refer to the Avoiding Social Engineering and Phishing Attacks document for more information on social engineering attacks.

Fake Antivirus Software Circulating

September 16th, 2008 . by DarkFiber Consulting

DarkFiber Consulting is aware of public reports indicating an increase in the instances of fake antivirus software circulating. These software applications are malicious code, not legitimate antivirus applications. These instances of malicious code are noted as being distributed through spam email messages containing malicious links, instant messages containing malicious links, private messages on social networking sites, infection from other malware, and from visiting compromised websites.

Quite often, this malware attempts to convince users that there is something wrong with their systems. This leads to an attempt persuade the users into purchasing an illegitimate antivirus application. If the user purchases the bogus software, the attacker may be able to obtain personal and credit card information for use in additional scams and fraudulent activity.

DarkFiber Consulting encourages users to perform the following preventative measures to help mitigate the risks:

  • Install legitimate antivirus software from a trusted vendor, and keep its virus signature files up-to-date.
  • Do not follow unsolicited web links found in email messages or instant messages.
  • Use caution when visiting untrusted websites.
  • Do not install untrusted software.

Malware Targeting Adobe Flash Player

August 5th, 2008 . by DarkFiber Consulting

Adobe has issued a Security Bulletin warning of malware spreading via a fraudulent Flash Player installer. Adobe warns that a worm is making fraudulent posts on social networking sites. These posts include links that lead to fake sites that prompt users to update their versions of Flash Player. If users attempt to use the installer to make the update, malware may be downloaded and installed onto their systems.

DarkFiber Consulting urges users and administrators to take the following preventative measures to help mitigate the security risks: