Skip to main content

Malware Writers Riding European Storms

Even as storms were buffeting Europe, email messages bearing the Small.DAM Trojan horse begin pummeling email servers and inboxes around the world, claiming to carry details of the storm’s rampage. The email messages, many bearing the subject “”230 dead as storm batters Europe,” could leave unprotected computers vulnerable to attack or takeover by spammers. When opened, the attachment—which could arrive under a number of different names—installs a back door which can give the malware author complete access to the infected PC.

In a statement, Mikko Hypponen, Chief Research Officer at F-Secure said: “Trojan assaults of this scale are an unfortunate and increasingly common event. What is significant here though is the timely nature of this assault in relation to the European storm. Malware gangs are clearly using every technique and even tragedies like these to gain access to vulnerable machines.”

As with other malware attacks, the intention of the so-called “Storm Surge” in malware is probably to create or expand a network of zombie computers which can be used to steal Internet users’ personal information and distribute email spam on a large scale. It’s not the first time a major news event has been tied to a upswing in malware distribution: malware distributors often take advantage of celebrity news or well-known events to encourage unwary users to open their messages and potentially make their computers vulnerable to exploitation. A well-known instance followed the devastation of New Orleans and southern Mississippi by Hurricane Katrina in 2005.

Computer security experts advise users to keep their security and antivirus software up to date, and not to open email attachments unless they’re expected.

When a user unwittingly activates a trojan horse, virus writers usually use the programs to search the user’s machine for email addresses and credit card information (both of which can be sold to cyber-criminals and others), then frequently use the computer as part of a “zombie” network to distribute more spam and viruses.

Editors' Recommendations

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
Beware: many ChatGPT extensions and apps could be malware
OpenAI's ChatGPT blog post is open on a computer monitor, taken from a high angle.

ChatGPT fever has overtaken the internet, and rightly so since it's such a powerful new tool. Unfortunately, the most sought-after content is often fertile ground for hackers and scammers.

In a recent video, cybersecurity-focused YouTuber John Hammond warned that many ChatGPT extensions and apps could contain malware. It's a valid point, and we should all use caution when installing desktop browser add-ons and mobile apps.

Read more
ChatGPT just created malware, and that’s seriously scary
A MacBook Pro on a desk with ChatGPT's website showing on its display.

A self-professed novice has reportedly created a powerful data-mining malware using just ChatGPT prompts, all within a span of a few hours.

Aaron Mulgrew, a Forcepoint security researcher, recently shared how he created zero-day malware exclusively on OpenAI's generative chatbot. While OpenAI has protections against anyone attempting to ask ChatGPT to write malicious code, Mulgrew found a loophole by prompting the chatbot to create separate lines of the malicious code, function by function.

Read more
This Mac malware can steal your credit card data in seconds
Apple's Craig Federighi speaking about macOS security at WWDC 2022.

Despite their reputation for security, Macs can still get viruses, and that’s just been proven by a malicious new Mac malware that can steal your credit card info and send it back to the attacker, ready to be exploited. It’s a reminder to be careful when opening apps from unknown sources.

The malware, dubbed MacStealer, was discovered by Uptycs, a threat research firm. It hoovers up a wide array of your personal data, including the iCloud Keychain password database, credit card data, cryptocurrency wallet credentials, browser cookies, documents, and more. That means there’s a lot that could be at risk if it gains a foothold on your Mac.

Read more