A website associated with President Barack Obama is exploited by miscreants in order to distribute Trojans. The new president’s use of Web 2.0 technologies is being misused in a fake video codec scam centered around My.BarackObama.com, an online community for supporters of the new president.
Websense Security Labs has detected that malicious hackers have registered multiple bogus user accounts on My.BarackObama.com (an online community for citizens to rally behind President Obama), in order to spread malicious code around the Web. A My.BarackObama.com social-networking account empowers the user with tools to join groups, raise funds, and even create blogs. The option to create your own blog is a common feature provided by most of the popular Web 2.0 social sites today, driven by user-generated content.
In the Obama campaign, malicious hackers created blogs on My.BarackObama.com with a fake YouTube image, enticing visitors to “Click here to see movie”.
Clicking on the link leads to a Web site using YouTube’s template for viewing online videos, filled with pornography. Clicking on the video to view results in the Web site prompts the browser to download a supposedly required video codec, which is really a malicious Trojan .exe.
The malicious campaign doesn’t end there. Since BarackObama.com is a highly visible, reputable, and popular Web site with almost 9,000 other sites linking to it according to Alexa, malicious hackers have been spraying these BarackObama.com URLs all over the Web by injecting them onto blog comment forms, and various user-generated content management systems. Visitors who double-click on this downloaded .exe will also be infected with a Trojan.
More on CyberInsecure: