Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity

    Hurricane Irene Scams, Phishing Attacks on the Way, DHS Warns

    Written by

    Fahmida Y. Rashid
    Published August 26, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Cyber-criminals may take advantage of the public’s desire for information aboutHurricane Irene to push out malicious emails and other cyber-scams, the Department of Homeland Security warned.

      Government agencies and private companies should be on the lookout for phishing attacks masquerading as news regarding the storm and other malicious activity, DHS said in an alert issued Aug. 25. Cyber-criminals often use highly publicized events to snare users into falling for their scams, the agency said.

      The emails may appear to originate from a reputable source and would likely have subject lines that reference the storm. Network administrators and general Internet users should be aware of these attempts and avoid opening those types of messages, the advisory said. Clicking on the emails could cause keyloggers, remote access tools and other malicious software to be downloaded onto the user’s computer, DHS warned.

      “Both government agencies and private organizations could possibly become recipients of malicious activity, most commonly in the form of socially engineered spear-phishing emails,” the alert from the DHS National Cybersecurity and Communications Integration Center said.

      Organizations need to be vigilant as recent high-profile attacks against companies, such as RSA Security andOak Ridge National Laboratory, originated with a phishing email.

      Scammers have increasingly taken advantage of natural disasters to push their malicious agenda. Earlier this year, search engine results were poisoned to return malicious links shortly afterJapan was hit by an earthquake and in subsequent weeks as the Japanese struggled to contain theFukushima nuclear plant. Criminals pushed out phishing emails pretending to be from the American Red Cross asking for donations to help earthquake victims. Security vendors warned of similar emails after the earthquake in Haiti.

      Criminals are also using black-hat search engine optimization techniques to corrupt search engine results to return malicious sites for certain keywords or distribute malicious posts on social networking sites such as Facebook and Twitter to push out links. When users search on those terms and come across those links, their systems are compromised.

      “When a major world event occurs, people feel like there’s an urgent ‘need’ to know what’s going on, a bit of a frenzy,” said Cameron Camp, an ESET researcher. “There’s a scramble to find the most reliable up-to-the-minute information and less attention paid to the normal defenses,” Camp said.

      There is also a social element involved, as many of these malicious links also spread on social networking sites, making people think that their “friends” sent the information along, Camp said.

      The entire situation is complicated by the fact that federal agencies, disaster-relief organizations and state and local governments are also using email, Facebook and Twitter to warn people about the track of the storm, announce evacuation plans and generally spreading information.

      Virginia Governor Bob McDonnell warned the state’s residents to take “seriously the need to prepare for this significant storm and to ready their families, homes and communities for possible evacuation” via Facebook. New Jersey Governor Chris Christie posted on Twitter that he would be holding a news conference on hurricane preparedness. The New York Times has posted a list on Twitter of hurricane-related information and resources such as weather forecasts and evacuation centers.

      For up-to-date information, people should go to reputable Websites, such as major news organizations, Camp said. Instead of clicking on a link, they should type the URL directly into the browser address bar and avoid clicking on shortened links, even if the accompanying text claims it’s from a well-known site.

      Hurricane Irene moved northwest along the coast of the Carolinas on Friday and is expected to continue hugging the East Coast, hitting New York City and southern New England in the afternoon of Aug. 28.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.