CERT mailing list archives

Current Activity - Potential WikiLeaks Phishing Scams


From: Current Activity <us-cert () us-cert gov>
Date: Wed, 1 Dec 2010 17:50:45 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

Potential WikiLeaks Phishing Scams

Original release date: December 1, 2010 at 5:42 pm
Last revised: December 1, 2010 at 5:42 pm


In the past, US-CERT has received reports of phishing scams and
malware campaigns related to topics that are of high-interest to the
U.S. Government or news media, such as the WikiLeaks website. Users'
systems have been compromised by receiving and accessing phishing
emails with subject lines that seem relevant to a high-interest
subject and appear to originate from a valid sender. US-CERT reminds
users to remain vigilant for potential malicious cyber activity
seeking to capitalize on interest in WikiLeaks. Users are advised to
exercise caution in handling any email with subject line, attachments,
or hyperlinks related to WikiLeaks, even if it appears to originate
from a trusted source.

US-CERT encourages users and administrators to use caution when
encountering these types of email messages and take the following
preventative measures to protect themselves from phishing scams and
malware campaigns:

  * Do not follow unsolicited web links in email messages.
  * Use caution when opening email attachments. Refer to the Using
    Caution with Email Attachments Cyber Security Tip for more
    information on safely handling email attachments.
  * Maintain up-to-date antivirus software.
  * Refer to the Recognizing and Avioding Email Scams (pdf) document
    for more information on avoiding email scams.
  * Refer to the Avoiding Social Engineering and Phishing Attacks
    Cyber Security Tip for more information on social engineering
    attacks.

Relevant Url(s):
<http://www.us-cert.gov/cas/tips/ST04-014.html>

<http://www.us-cert.gov/reading_room/emailscams_0905.pdf>

<http://www.us-cert.gov/cas/tips/ST04-010.html>

====
This entry is available at
http://www.us-cert.gov/current/index.html#potential_wiki_leaks

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBTPbRMD6pPKYJORa3AQKpIwgAxppr7KabtAYgjqthLlhpEqiJSEw6/hmt
Uai7YjuEY65KTBdDZ3uRRQr7v+2Ytp0N/wUJ+o8yW+R5LaYyPJI/9IWcPnvQNOom
okTnRw/uUBzDwH+uurtzm/N3rQEP35wnwhr/AFmiZvj9TJ0o8HhTCNwfjyF0w7SG
bTK2Uor/FQbXCc5CH2lAd8j2w/QvIzWz8ewNGs6YH8J7VsP9MKcYW8ngtZ7yVq63
F/dTwwheWE2Rf7lJpdXcAgyuOmk0cKG/68F7mszP32iralcm4BkysmzzO0Bep+nM
g/aQuXBQay1fXmBhBX28OnnlpaqYDubvOV57ekjGI2HtvsISmiZKnA==
=eCUI
-----END PGP SIGNATURE-----


Current thread: