Skip to main content

Malware Writers Riding European Storms

Even as storms were buffeting Europe, email messages bearing the Small.DAM Trojan horse begin pummeling email servers and inboxes around the world, claiming to carry details of the storm’s rampage. The email messages, many bearing the subject “”230 dead as storm batters Europe,” could leave unprotected computers vulnerable to attack or takeover by spammers. When opened, the attachment—which could arrive under a number of different names—installs a back door which can give the malware author complete access to the infected PC.

In a statement, Mikko Hypponen, Chief Research Officer at F-Secure said: “Trojan assaults of this scale are an unfortunate and increasingly common event. What is significant here though is the timely nature of this assault in relation to the European storm. Malware gangs are clearly using every technique and even tragedies like these to gain access to vulnerable machines.”

Recommended Videos

As with other malware attacks, the intention of the so-called “Storm Surge” in malware is probably to create or expand a network of zombie computers which can be used to steal Internet users’ personal information and distribute email spam on a large scale. It’s not the first time a major news event has been tied to a upswing in malware distribution: malware distributors often take advantage of celebrity news or well-known events to encourage unwary users to open their messages and potentially make their computers vulnerable to exploitation. A well-known instance followed the devastation of New Orleans and southern Mississippi by Hurricane Katrina in 2005.

Computer security experts advise users to keep their security and antivirus software up to date, and not to open email attachments unless they’re expected.

When a user unwittingly activates a trojan horse, virus writers usually use the programs to search the user’s machine for email addresses and credit card information (both of which can be sold to cyber-criminals and others), then frequently use the computer as part of a “zombie” network to distribute more spam and viruses.

Geoff Duncan
Former Digital Trends Contributor
Geoff Duncan writes, programs, edits, plays music, and delights in making software misbehave. He's probably the only member…
Is macOS more secure than Windows? This malware report has the answer
A person using a laptop with a set of code seen on the display.

It’s a long-held belief that Macs are less at risk of malware and viruses than Windows PCs, but how true is that? Well, a new report has shed some light on the situation -- and the results might surprise you.

According to threat research firm Elastic Security Labs, roughly 39% of all malware infections happen on Windows PCs. In good news for Apple fans, only 6% of breaches occurred on macOS, making Mac systems far less vulnerable than their Windows counterparts.

Read more
Beware: many ChatGPT extensions and apps could be malware
OpenAI's ChatGPT blog post is open on a computer monitor, taken from a high angle.

ChatGPT fever has overtaken the internet, and rightly so since it's such a powerful new tool. Unfortunately, the most sought-after content is often fertile ground for hackers and scammers.

In a recent video, cybersecurity-focused YouTuber John Hammond warned that many ChatGPT extensions and apps could contain malware. It's a valid point, and we should all use caution when installing desktop browser add-ons and mobile apps.

Read more
ChatGPT just created malware, and that’s seriously scary
A MacBook Pro on a desk with ChatGPT's website showing on its display.

A self-professed novice has reportedly created a powerful data-mining malware using just ChatGPT prompts, all within a span of a few hours.

Aaron Mulgrew, a Forcepoint security researcher, recently shared how he created zero-day malware exclusively on OpenAI's generative chatbot. While OpenAI has protections against anyone attempting to ask ChatGPT to write malicious code, Mulgrew found a loophole by prompting the chatbot to create separate lines of the malicious code, function by function.

Read more