YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Small Screen Tart Spam Leads to Malware Misery

Posted On 13 Apr 2007
By : admin

CYBERSPACE — Horny admirers of porn mega queen Jenna Jameson and/or pampered hotel chain princess Paris Hilton got more than they bargained for recently when they clicked on spam claiming to lead to exotic images of each.Instead of compromising photos of their favorite bottle blondes, the computer users found themselves downloading gobs of malware.

According to security experts, the masterminds behind this latest attack on home computer security were responsible for last week’s similar assault, which promised naughty visuals of rehab romantic Britney Spears.

“What’s interesting about this,” observes Sunbelt Software president Alex Eckelberry on SCMagazine.com, “is that these guys are sending out these bold, graphic pictures that have striking images. It’s all trying to invite a click.”

“These guys” are believed to be members of Russian organized crime collectives that recently began taking advantage of the Microsoft .ANI bug

According to researchers, those who click the link from the “Hot pictures of Paris Hilton nude” email find themselves looking at a large image of Jameson, instead of merely inheriting payloads from invasive worms clinging to executable attachments. Nonetheless, the websites they ultimately connect with are loaded with the Iffy-B Trojan, which sends the compromised system to malware intent to exploit the Microsoft weakspot.

“It’s pretty sophisticated stuff,” Eckelberry points out. “It’s heavily obfuscated JavaScript code that takes you to a number of different sites.”

Eckelberry says that the new, graphically oriented spam began approximately two weeks ago and arrives with a convincing Microsoft graphic instructing recipients to download Internet Explorer beta 2. When the gullible computer user attempts to do so, their system swallows a worm.

Things changed after last Wednesday’s out-of-cycle animated cursor fix was released. That’s when the Spears spam began to make the rounds, serving up malicious code hidden inside of saucy photos of the divorcing and recently panty-free performer. Eckelberry warns that web-based mail such as Hotmail or Yahoo may be particularly vulnerable to these schemes.

Sophos senior technology consultant Graham Cluley worries that “The problem is that consumers and businesses may not yet have patched themselves against this vulnerability, and clicking on unsolicited emails like these could lead them to a nasty malware infection.”

Even systems freshly patched may not be impervious to attack, however. Dan Hubbard, vice-president of Websense has estimated that there were 700 malicious code sites located last week and says that “We’re seeing a little over 2,000 sites that have exploits or point to exploit code in one way or another.

Microsoft released an emergency patch for the .ANI bug last week. Security professionals, though, are concerned that users who are slow to patch will become new victims as attacks on the vulnerability continue to surge. Dan Hubbard, VP of security company Websense, said in an interview that the patch hasn’t slowed the creation of new exploits. They’re still coming online at an alarming rate. “The patch definitely helped,” he reassures. “It went from 100-percent of people with Internet Explorer being vulnerable to a smaller subset.” But he cautions that “It didn’t slow the attacks. It just made their success rate lower.”

Hubbard says that the initial wave of .ANI exploits originated from Chinese servers and appeared to focus on stealing the profitable credentials of online Lineage players. Things have shifted away from gaming and China now, however, with Russian crime members entering the scene, planting code on American based sites, and looking for visitors’ banking information.

Although the .ANI vulnerability affected all Windows systems, including the brand new Vista OS, Mozilla’s Firefox browser is also at risk, although current attacks have not focused on the open-source application.

  • google-share
Previous Story

Attorney Asks Kentucky Appeals Court for Chance to Counter “Secondary Effects” Arguments

Next Story

Chinese Government Announces New Offensive against Internet Porn

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • Clickadu – Your trusted traffic souce
    Marketing & Traffic Services
  • Grand Slam Media
    Adult Traffic Networks
  • Best Porn Flix
    Tube Sites
  • Premiere Listing

    TrafficStars

    More Details

RECENT

POPULAR

COMMENTS

Fucking Your Stepmom is Better Than Video Games

Posted On 16 Sep 2025

Andie Anderson Gets Her Extra Sausage at Nookies

Posted On 16 Sep 2025

Tiffani Time Seduces Her Jiujitsu Teacher

Posted On 16 Sep 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Someone puts Gal Gadot in one of your vids? Take it down!

Posted On 13 Dec 2017

Hoping viewers can also enjoy a spooky...

Posted On 24 Oct 2023

now a days these type of games will get...

Posted On 17 Jul 2023

good move from adent. these type of...

Posted On 06 Jul 2023

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy