CERT mailing list archives
Current Activity - Malware Campaigns Impersonating U.S. Government Agencies
From: Current Activity <us-cert () us-cert gov>
Date: Tue, 28 Aug 2012 16:49:12 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Awareness System US-CERT Current Activity Malware Campaigns Impersonating U.S. Government Agencies Original release date: Tuesday, August 28, 2012 at 4:31 pm Last revised: Tuesday, August 28, 2012 at 4:31 pm US-CERT is aware of multiple malware campaigns impersonating multiple U.S. government agencies, including the United States Cyber Command (USCYBERCOM) and the Federal Bureau of Investigation (FBI). Once installed on a system, the malware displays a screen claiming that a Federal Government agency has identified the user's computer as being associated with one or more crimes. The user is told to pay a fine to regain the use of the computer, usually through prepaid money card services. Affected users should not follow the payment instructions. US-CERT encourages users to follow the recommendations in Security Tip ST05-006, Recovering from Viruses, Worms, and Trojan Horses. Users may also choose to file a complaint with the FBI's Internet Crime Complaint Center (IC3). Relevant URL(s): <http://www.ic3.gov/default.aspx> <http://www.us-cert.gov/cas/tips/ST05-006.html> ____________________________________________________________________ Produced by US-CERT, a government organization. ____________________________________________________________________ This product is provided subject to this Notification: http://www.us-cert.gov/privacy/notification.html Privacy & Use policy: http://www.us-cert.gov/privacy/ This document can also be found at http://www.us-cert.gov/current/#malware_campaigns_impersonating_u_s For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBUD0uvndnhE8Qi3ZhAQJ4cwf/baUfkRDWZUgSW169m1XuBFLOODjdx8DK oBsUwCZGyn/mUbYCePKxsz2QIP04I5ELnjfhLIRj54XrQOCLLRnv8zKrNk06QCSe PVzRoBMS+Wbvo0UicbalZ0NDHETfwUXn9H6DrkXE84DsLiAjLZIazzozi3tQFAq8 Zt/nR2kjbHxKd1bZz/FayE+SSd8GHHJEC0BACJtEFtgpKH3WgVVITT+kBavk0hqF yxDc5PVEJe64GuD74ukaKTgNSZIqlC3/6D+sEPG5eOG3d/K7yhC10WnBCNsprPcy MAGtcvlFfUeP8xFKYrq9mOiZPrMA2EUXnWKAFpn2YPsCH7LSEh+yXg== =dkJN -----END PGP SIGNATURE-----
Current thread:
- Current Activity - Malware Campaigns Impersonating U.S. Government Agencies Current Activity (Aug 28)