Britney Spears Spam Campaign Tied To .ANI Exploit Flaw

We have seen a rash of obvious spam touting vulgar pictures of Britney Spears this week. Users receive an email with the subject line “Hot Pictures of Britiney Speers” that is written in HTML and has anti-spam avoidance text within the HTML comments. Evidence that came to light this morning suggests that this particular spam campaign is directly related to the animated cursor exploit flaw that has been causing problems since last week. Links in the spam messages lead to sites either compromised, or built, to deliver trojans and keystroke loggers to any windows machine with animated cursors. Users should never, ever click on links in spammy messages…especially not these, no matter how badly they want to check out the hot pictures of Britney Spears.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s