|
Analysts learned of the e-mail attack last week and have spoken with federal authorities about it. Homeland Security Department spokeswoman Amy Kudwa said officials are aware of the ZueS e-mail and are monitoring it along with other similar malware attacks that have been tracked for some time. Cox and Jackson would not disclose details on who was attacked or what documents may have been compromised but agreed that the hackers probably were after the documents, rather than any banking or financial passwords. One theory, said Jackson, is that the hackers were looking for information about law enforcement cases and investigative techniques related to cybercrime so that they could sell it to other criminals. The e-mail attack, however, underscores the continuing vulnerability of government workers and their computer systems to versions of the ZueS malware. Hackers can easily tweak the code each time so that it does not trigger antivirus software. "Criminals have found that if they change the files in small
ways, it can slip past antivirus software," said Jackson. While ZueS-related attacks are fairly common, this latest one stood out because of the use of the White House connection to lure recipients in and the targeted way it went after law enforcement, analysts said. One U.S. official said that the code was rather poorly written. The hackers could only get easily accessible documents and not those filed deep within layers of folders on the hard drive, said the official, who spoke on condition of anonymity to discuss ongoing investigations.
[Associated
Press;
Copyright 2011 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
News | Sports | Business | Rural Review | Teaching & Learning | Home and Family | Tourism | Obituaries
Community |
Perspectives
|
Law & Courts |
Leisure Time
|
Spiritual Life |
Health & Fitness |
Teen Scene
Calendar
|
Letters to the Editor