Spammers using “No War on Syria” petitions to steal personal information

Spammers are taking advantage of the various online petitions against the recent news about the alleged arming of the Syrian rebels by the US to trick Internet users to disclose their personal information, according to media reports

Fake-No-War-on-Syria-Petitions-Used-by-Spammers-to-Harvest-Information-1

In response to the US involvement in the Syrian civil war, wherein the US intervention and its support to the fighting rebels has met with sharp criticisms across the Gulf region, several online petitions were launched asking the US administration to stop its interference in domestic affairs of Syria.

Fake-No-War-on-Syria-Petitions-Used-by-Spammers-to-Harvest-Information-2

In guise of these online petitions, there are several bogus petitions that have been launched by the spammers to harvest names, email addresses and other such information that can be used by them for their own campaign.

Fake-No-War-on-Syria-Petitions-Used-by-Spammers-to-Harvest-Information-3

Experts from Malwarebytes have reported numerous fake petitions. One such false spam claims that the petition will be delivered to the US House of Representatives, the Senate and Barrack Obama.

In yet another fake petition, the users are baited to win an Amazon gift card.

While most of the sham petitions seek only the email addresses and the user names of the internauts, experts do warn the users to be wary of signing any such petitions which could trick users into installing any malwares.

 


Total
0
Shares
Related Posts
New SystemBC malware targets Windows PCs by evading detection
Read More

New SystemBC malware targets Windows PCs by evading detection

While finding and removing malware on your computer system may indeed be a joyous moment, there's a new malware out there that will give you a headache instead. To know why, a dive through is needed into SystemBC, a malware written in C++ that has been discovered by researchers at Proofpoint and dubbed so because the word is a part of the URI path found in one of the malware's advertisements.