Job hunters blackmailed in Monster.com hack
American users who had registered with the site received e-mails last week inviting them to download a Job Seeker Tool from Monster. What they got was a Trojan horse virus that encrypted their files and a message from a group called Glamorous Team demanding a $300 ransom to decrypt their files.
Coverage in the UK newspaper, The Guardian , recounted the experiences of several people who were affected by the attack. One of the reasons it proved so effective was that it presented a plausible scenario from a site that would have been known and trusted by its users. What is almost as worrying as the blackmail technique is how the criminals were able to crack the Monster database to get hold of the users' e-mail addresses.
According to Symantec , which identified a Trojan virus called Infostealer.Monstres on August 16th, the attack started by accessing employer sections of Monster.com and uploaded details on several hundred thousand people to the remote website.
The second part of the attack spammed the e-mails harvested with an executable file Trojan.Gpcoder.E, which was carried as an attachment with an icon designed to look like the Monster.com logo.
When researchers from the UK security company Prevx reverse-engineered the encryption virus and used victims' details to log into the website where data was being held hostage, they were able to download personal information on several people and decrypt personal data such as system passwords and PayPal account details.
According to Prevx, the attack targeted Monster.com users in America and appropriated data from around 1,000 PCs.
By John Stokdyk, for our sister site, AccountingWEB.co.uk