Categories: Ad Guardian Plus

Malware poisoned online “political” campaigns

Cisco Talos released a study on the politically themed malware, used in everything from ransomware to remote access trojans (RAT). The study analysed a regular malicious spam campaign that used an executable named “Trump.exe”. The team discovered many similarly themed threats – “almost a microcosm of what we see in the threat landscape daily”.

Amongst these, there are Trump-themed ransomware (a type of malware that threatens to publish the victim’s data or block access to it until a ransom is paid) and separate Trump and Putin-themed locker malware. Still, one of the threats did not offer a way for hackers to obtain money.

CISCO also discovered many political RAT campaigns using the image of Putin. Some of them were using trap files, posing as political campaigns, that spread the RAT. They were using the image of Putin or Kim Jong Un. The “Trump_administration_economic_indicators_on_China_investements.xls” file contained malicious macros which infected the computers with PoisonIvy RAT, used usually in nation state attacks.

Cisco discovered also many other political software. Amongst them: the “Dancing Hillary” game and a “Trump’s Cyber Security Firewall” tool.

But we know our readers use Ad Guardian Plus to protect from this kind of malware.

Laurentiu Titei

View Comments

Recent Posts

Best and Safe ROM Sites to Download ROMs

Allow us to introduce you to a list of the best ROM sites for downloading…

3 days ago

Best Internet Browsers for Safe Browsing for Kids

If you are looking for the best safe browser for kids, you have come to…

1 week ago

Download and Update the HP Smart Tank 580 Driver for Windows PC

If you want to enhance the performance of your printer by way of the HP…

2 weeks ago

Best Computer Imaging Software to Image a PC

If you wish to install the contents on any Windows PC to another PC, you…

3 weeks ago

Best SQL Server Management Tool

If you are looking for server-based tools for database management using SQL, you can take…

1 month ago

Best Open-Source Vulnerability Scanners & Tools

If you want to ascertain the most vulnerable files, areas, and sectors in your data,…

1 month ago