CERT mailing list archives
Current Activity - Potential WikiLeaks Phishing Scams
From: Current Activity <us-cert () us-cert gov>
Date: Wed, 1 Dec 2010 17:50:45 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 US-CERT Current Activity Potential WikiLeaks Phishing Scams Original release date: December 1, 2010 at 5:42 pm Last revised: December 1, 2010 at 5:42 pm In the past, US-CERT has received reports of phishing scams and malware campaigns related to topics that are of high-interest to the U.S. Government or news media, such as the WikiLeaks website. Users' systems have been compromised by receiving and accessing phishing emails with subject lines that seem relevant to a high-interest subject and appear to originate from a valid sender. US-CERT reminds users to remain vigilant for potential malicious cyber activity seeking to capitalize on interest in WikiLeaks. Users are advised to exercise caution in handling any email with subject line, attachments, or hyperlinks related to WikiLeaks, even if it appears to originate from a trusted source. US-CERT encourages users and administrators to use caution when encountering these types of email messages and take the following preventative measures to protect themselves from phishing scams and malware campaigns: * Do not follow unsolicited web links in email messages. * Use caution when opening email attachments. Refer to the Using Caution with Email Attachments Cyber Security Tip for more information on safely handling email attachments. * Maintain up-to-date antivirus software. * Refer to the Recognizing and Avioding Email Scams (pdf) document for more information on avoiding email scams. * Refer to the Avoiding Social Engineering and Phishing Attacks Cyber Security Tip for more information on social engineering attacks. Relevant Url(s): <http://www.us-cert.gov/cas/tips/ST04-014.html> <http://www.us-cert.gov/reading_room/emailscams_0905.pdf> <http://www.us-cert.gov/cas/tips/ST04-010.html> ==== This entry is available at http://www.us-cert.gov/current/index.html#potential_wiki_leaks -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBTPbRMD6pPKYJORa3AQKpIwgAxppr7KabtAYgjqthLlhpEqiJSEw6/hmt Uai7YjuEY65KTBdDZ3uRRQr7v+2Ytp0N/wUJ+o8yW+R5LaYyPJI/9IWcPnvQNOom okTnRw/uUBzDwH+uurtzm/N3rQEP35wnwhr/AFmiZvj9TJ0o8HhTCNwfjyF0w7SG bTK2Uor/FQbXCc5CH2lAd8j2w/QvIzWz8ewNGs6YH8J7VsP9MKcYW8ngtZ7yVq63 F/dTwwheWE2Rf7lJpdXcAgyuOmk0cKG/68F7mszP32iralcm4BkysmzzO0Bep+nM g/aQuXBQay1fXmBhBX28OnnlpaqYDubvOV57ekjGI2HtvsISmiZKnA== =eCUI -----END PGP SIGNATURE-----
Current thread:
- Current Activity - Potential WikiLeaks Phishing Scams Current Activity (Dec 01)