This time, the bad guys want your tax accountant

avast: While taxpayers are the regular target of springtime malware schemes, this year the bad guys are aiming for the accountants.

A series of imposter emails are threatening recipients with the removal of their professional accreditation if they fail to respond promptly. The tax-phish appear to be from organizations such as the American Institute of Certified Public Accountants(AICPA), Better Business Bureau(BBB), and Intuit tax services.

tax_mail_01-2-294x300

After clicking on the email, users are redirected through a hacked legitimate site to the final malware distribution center where their computer can download fake antivirus or another malware package selected by the bad guys.

This spam campaign started in the last week of February. A tax-themed attack is a traditional feature of March and April as Americans prepare their income tax returns.

The tax-time malware is the latest example of the BlackHole Exploits Kit at work – and shows that the bad guys’ graphic and language skills are improving.

The BlackHole Exploits Kit is a set of code available to bad guys on the black market. The Kit primarily focuses on JavaScript vulnerabilities. The Kit is used to spread malware such as Zeus botnets, rootkits, or fake antivirus packages. BlackHole has been continually improved since the first version surfaced in August 2010. Not only does BlackHole remove competing malware, it also comes with an option for the bad guys to test its efficiency against the major antivirus suppliers. That is real criminal quality assurance.

tax_malware_redirector-2-300x240

From the graphic perspective, the email is visually attractive, even including a fake sending address and is in reasonably good English. And, they even used the correct top level domains for the AICPA and BBB addresses.

The payload of this is most likely a fake antivirus. However, one of the technical attractions of BlackHole is that it is quite easy for the bad guys to change the payload and the redirector sites. So, it could really be anything.

So, watch where you click.

Similar Posts

  • PayPal Phish

    PayPal users are at risk of getting their credentials stolen if they follow instructions given in a scam email. “We have reason to believe that your account was accessed by a third party…. PayPal will verify it with your bank records for your own protection. If you provide a wrong PIN your account will be…

  • No further updates for Debian 5.0 Lenny

    The H-Online: The Debian developers have pointed out, in an announcement on the debian-announce mailing list, that – three years after it was released –Debian GNU/Linux 5.0 (Lenny) has reached its “End of Life”. Debian GNU/Linux 5.0 was originally released in February 2009 and on 6 February 2012, the developers stopped providing security updates for…

  • Merogo SMS worm

    We’re investigating a series of SMS Worms, found in the wild in China. Known as Trojan:SymbOS/MerogoSMS, these worms try to spread on Symbian Series 60 3rd Edition devices. Symbian continues to be by far the most common smartphone operating system in the world. These worms spread by sending text messages to other phones. These text…

  • Guard Pro

    Guard Pro is a rogue antispyware software, or a phony. Guard Pro uses fake system scans and warnings to frighten people into buying the software. Guard Pro will show system scan results that report numerous infections, which are all fake, and will not remove the supposed infections until the user buys the product. Do not…

  • Facebook Users Like Sex [STATS]

    Self-proclaimed social media scientist Dan Zarrella has already applied linguistic methodologies to psychologically profile Twitter users. Now he’s using the same technology and approach to break down Facebook sharing behaviors. Zarrella uses the Regressive Imagery Dictionary (RID) and Linguistic Inquiry and Word Count (LIWC) methods to arrive at the conclusion that, “Articles … that include…