CERT mailing list archives
Current Activity - Potential WikiLeaks Phishing Scams
From: Current Activity <us-cert () us-cert gov>
Date: Wed, 1 Dec 2010 17:50:45 -0500
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
US-CERT Current Activity
Potential WikiLeaks Phishing Scams
Original release date: December 1, 2010 at 5:42 pm
Last revised: December 1, 2010 at 5:42 pm
In the past, US-CERT has received reports of phishing scams and
malware campaigns related to topics that are of high-interest to the
U.S. Government or news media, such as the WikiLeaks website. Users'
systems have been compromised by receiving and accessing phishing
emails with subject lines that seem relevant to a high-interest
subject and appear to originate from a valid sender. US-CERT reminds
users to remain vigilant for potential malicious cyber activity
seeking to capitalize on interest in WikiLeaks. Users are advised to
exercise caution in handling any email with subject line, attachments,
or hyperlinks related to WikiLeaks, even if it appears to originate
from a trusted source.
US-CERT encourages users and administrators to use caution when
encountering these types of email messages and take the following
preventative measures to protect themselves from phishing scams and
malware campaigns:
* Do not follow unsolicited web links in email messages.
* Use caution when opening email attachments. Refer to the Using
Caution with Email Attachments Cyber Security Tip for more
information on safely handling email attachments.
* Maintain up-to-date antivirus software.
* Refer to the Recognizing and Avioding Email Scams (pdf) document
for more information on avoiding email scams.
* Refer to the Avoiding Social Engineering and Phishing Attacks
Cyber Security Tip for more information on social engineering
attacks.
Relevant Url(s):
<http://www.us-cert.gov/cas/tips/ST04-014.html>
<http://www.us-cert.gov/reading_room/emailscams_0905.pdf>
<http://www.us-cert.gov/cas/tips/ST04-010.html>
====
This entry is available at
http://www.us-cert.gov/current/index.html#potential_wiki_leaks
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBTPbRMD6pPKYJORa3AQKpIwgAxppr7KabtAYgjqthLlhpEqiJSEw6/hmt
Uai7YjuEY65KTBdDZ3uRRQr7v+2Ytp0N/wUJ+o8yW+R5LaYyPJI/9IWcPnvQNOom
okTnRw/uUBzDwH+uurtzm/N3rQEP35wnwhr/AFmiZvj9TJ0o8HhTCNwfjyF0w7SG
bTK2Uor/FQbXCc5CH2lAd8j2w/QvIzWz8ewNGs6YH8J7VsP9MKcYW8ngtZ7yVq63
F/dTwwheWE2Rf7lJpdXcAgyuOmk0cKG/68F7mszP32iralcm4BkysmzzO0Bep+nM
g/aQuXBQay1fXmBhBX28OnnlpaqYDubvOV57ekjGI2HtvsISmiZKnA==
=eCUI
-----END PGP SIGNATURE-----
Current thread:
- Current Activity - Potential WikiLeaks Phishing Scams Current Activity (Dec 01)
