Connect with us

Fake White House holiday e-mail is cyber attack



Law enforcement, military workers targeted by fake White House holiday e-mail

It looked like an innocent e-mail Christmas card from the White House.

But the holiday greeting that surfaced just before Christmas was a ruse by cybercriminals to steal documents and other data from law enforcement, military and government workers — particularly those involved in computer crime investigations.


Analysts who have studied the malicious software said Tuesday that hackers were able to use the e-mail to collect sensitive law enforcement data. But so far there has been no evidence that any classified information was compromised.

The targeted e-mail attack comes as the federal government is desperately trying to beef up its cybersecurity after the release of thousands of State Department cables and military documents by the WikiLeaks website. Federal authorities want to improve technology systems and crack down on employees to prevent the theft or loss of classified and sensitive information.

The red holiday e-mail card, with its brightly decorated Christmas tree, prompted recipients to click on a link, which would then download the ZueS malware — a well-known malicious code that is often used to steal passwords and other online credentials, primarily to poach Internet banking information. The malware was created several years ago and is widely available for criminals to acquire and adapt. It has been used to steal millions of dollars.

In this case, however, the code downloaded a second payload that is designed to steal documents from the recipient’s computer, accessing Microsoft Word and Excel files.

Don Jackson, director of threat intelligence for Atlanta-based SecureWorks, a computer security consulting company, said the attack was somewhat small and targeted to a limited number of groups with law enforcement, military and government affiliations.


It was small enough, he said, to suggest that is was sent out manually and not by a large network of infected computers. He said it was not large enough to be picked up by cybersecurity spam traps or sensors.

Alex Cox, principle research analyst for NetWitness, a cybersecurity firm in northern Virginia, said the e-mail was sent out just a day or so before Christmas, delivered by a control server in Belarus. He and Jackson said they believe this ZueS version was created by the same people who launched a similar but much larger attack last February.

Cox, who discovered the ZueS-infected malware last year when it infected at least 74,000 computers, said it’s hard to determine how many people were affected or how many documents were stolen in this latest attack.


Jackson said at the hackers stole at least several gigabytes of data.

Analysts learned of the e-mail attack last week and have spoken with federal authorities about it.


Homeland Security Department spokeswoman Amy Kudwa said officials are aware of the ZueS e-mail and are monitoring it along with other similar malware attacks that have been tracked for some time.

Cox and Jackson would not disclose details on who was attacked or what documents may have been compromised but agreed that the hackers probably were after the documents, rather than any banking or financial passwords.

One theory, said Jackson, is that the hackers were looking for information about law enforcement cases and investigative techniques related to cybercrime so that they could sell it to other criminals.


The e-mail attack, however, underscores the continuing vulnerability of government workers and their computer systems to versions of the ZueS malware. Hackers can easily tweak the code each time so that it does not trigger antivirus software.

“Criminals have found that if they change the files in small ways it can slip past antivirus software,” said Jackson.

While ZueS-related attacks are fairly common, this latest one stood out because of the use of the White House connection to lure recipients in and the targeted way it went after law enforcement, analysts said.

One U.S. official said that the code was rather poorly written. The hackers could only get easily accessible documents and not those filed deep within layers of folders on the hard drive, said the official, who spoke on condition of anonymity to discuss ongoing investigations.


Source: AP News

Mochila insert follows…

Powered by Mochila


Report typos and corrections to: [email protected].
Continue Reading


Fears grow on digital surveillance: US survey



Americans are increasingly fearful of monitoring of their online and offline activities, both by governments and private companies, a survey showed Friday.

The Pew Research Center report said more than 60 percent of US adults believe it is impossible to go about daily life without having personal information collected by companies or the government.

Most Americans are uneasy about how their data is collected and used: 79 percent said they are not comfortable about the handling of their information by private firms, and 69 percent said the same of the government.

Seven in 10 surveyed said they think their personal data is less secure than five years ago, while only six percent said it is more secure, the report found.

Continue Reading

Breaking Banner

CNN legal analysts rip apart Jim Jordan’s ‘nonsensical’ defense of Trump witness intimidation



CNN legal analyst Elie Honig blasted Rep. Jim Jordan (R-OH) for arguing that President Donald Trump hadn't engaged in witness intimidation by tweeting attacks on a former ambassador as she testified against him in the impeachment inquiry.

Jordan argued the tweet can't be witness intimidation because Marie Yovanovitch wouldn't have known about the attack if Rep. Adam Schiff (D-CA) hadn't read it to her, but Honig said the GOP lawmaker's claim was ridiculous.

"His point is nonsensical," Honig said. "Of course, she was going to find out about a tweet that went out to 60 million people-plus. The law covers any way you look regarding timing."

Continue Reading


‘Everyone he touches gets tainted’: CNN panel astonished by number of criminally convicted Trump allies



A CNN panel on Friday stood in awe at the number of President Donald Trump's allies who have been convicted of crimes ever since his election in 2016.

During a panel discussion about Trump ally Roger Stone's conviction on seven criminal counts that included witness intimidation, perjury, and obstruction of justice, CNN host Anderson Cooper said it was astonishing how many of the people who helped the president get elected have wound up in jail.

"In your own life, how many people are you close to in your orbit who have been convicted of crimes?" Cooper asked and then listed off former Trump campaign chairman Paul Manafort, former national security adviser Michael Flynn, former Trump campaign aide George Papadopoulos, and former personal attorney Michael Cohen.

Continue Reading
Help Raw Story Uncover Injustice. Join Raw Story Investigates for $1 and go ad-free.