Select Page

Cyren Security Blog

The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.

Shameless malware distribution abuses Texas explosion and Boston Marathon Attack

Malware distributors are turning to recent events to get recipients to follow links to infected websites. The recent “Pope-themed” malware attack is one such example. The attacks at the Boston Marathon and the explosion at a Texas fertilizer plant have been quickly exploited with large quantities of emails sent out including subjects such as:

  • CAUGHT ON CAMERA: Fertilizer Plant Explosion
  • CAUGHT ON CAMERA: Fertilizer Plant Explosion Near Waco, Texas
  • Fertilizer Plant Explosion Near Waco, Texas
  • Texas Explosion Injures Dozens
  • Raw: Texas Explosion Injures Dozens
  • Texas Plant Explosion

Similar Boston Marathon-themed emails included subjects such as:

  • Video of Explosion at the Boston Marathon 2013
  • BREAKING – Boston Marathon Explosion
  • Explosion at Boston Marathon
  • Aftermath to explosion at Boston Marathon

Bostom marathon malware - email

Commtouch’s subject cloud for Wednesday April 17th showed how dominant the malware attack was (larger text means the word featured in a larger numbers of email subjects).

Bostom marathon malware - subject cloud

The links lead to a Web page showing embedded YouTube clips of the bombings. The Texas explosion emails led to almost identical pages. Both pages include an invisible iframe that results in an executable malware download.

Bostom marathon malware - youtube webpage

Texas malware - youtube webpage

You might also like

Protect Office 365 Email from Ransomware

Ransomware is continually evolving. It has become the “most prominent malware threat”, with experts estimating that ransomware attacks in 2021 resulted in total damage costs of $20 billion. While there is no ransomware that specifically targets Office 365 data, it can...