{"id":469,"date":"2010-01-21T12:56:20","date_gmt":"2010-01-21T07:26:20","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=469"},"modified":"2024-11-09T17:01:59","modified_gmt":"2024-11-09T11:31:59","slug":"new-computer-virus-disguised-as-social-security-administration-download","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/","title":{"rendered":"NEW COMPUTER VIRUS DISGUISED AS SOCIAL SECURITY ADMINISTRATION DOWNLOAD"},"content":{"rendered":"<p style=\"text-align: justify;\">A new spam campaign using false e-mails made to look like messages from the Social Security Administration is capable of stealing Social Security numbers and downloading malware onto victims&#8217; home computers, says Gary Warner, director of computer forensics at the University of Alabama at Birmingham (UAB).<\/p>\n<p style=\"text-align: justify;\">The campaign was discovered Nov. 23 by Warner and his team in the UAB Spam Data Mine.<\/p>\n<p style=\"text-align: justify;\">&#8220;In this continued difficult economy, these cyber criminals are now preying on victims&#8217; concerns over money, promising Social Security payouts and tax breaks to victims that sign in to the criminals&#8217; fake Social Security Web pages,&#8221; Warner says.<\/p>\n<p style=\"text-align: justify;\">The spam messages tell users that there are errors with their Social Security statement then asks them to link to false pages made to look like the Social Security Administration Web site. Warner says the false pages ask users to enter their Social Security numbers before prompting them to download their fake statement.<\/p>\n<p style=\"text-align: justify;\">&#8220;The reality is that the download is actually a virus capable of stealing personal information, including bank passwords, from home computers,&#8221; Warner says. &#8220;So once you have completed the login and download, the cyber criminals not only have your Social Security number, they also have infected your computer with serious malware that enables them to steal information and raid your bank and other accounts.&#8221;<\/p>\n<p style=\"text-align: justify;\">Warner says the UAB Spam Data Mine uncovered the new Social Security scam during its daily routine searchers for the top spam campaigns, which are conducted every 15 minutes due to the high volume of spam arriving in the data mine&#8217;s inboxes each day.<\/p>\n<p style=\"text-align: justify;\">&#8220;This morning (Nov. 23) over the course of just two search periods, or just one half hour, we went from zero instances of the Social Security spam to uncovering some 600 samples of the spam,&#8221; Warner said. &#8220;So we have not only uncovered a very new campaign, but a quick-spreading one as well.&#8221;<\/p>\n<p style=\"text-align: justify;\">Warner reminds computer users that no legitimate company or agency would ever ask users to update or review records via e-mail, but instead would request they do so only through that company&#8217;s own Web site. E-mails requesting account updates should not be considered legitimate, Warner says.<\/p>\n<p style=\"text-align: justify;\">Source : <a href=\"http:\/\/www.sciencedaily.com\/\">www.sciencedaily.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new spam campaign using false e-mails made to look like messages from the Social Security Administration is capable of stealing Social Security numbers and downloading malware onto victims&#8217; home computers, says Gary Warner, director of computer forensics at the University of Alabama at Birmingham (UAB). The campaign was discovered Nov. 23 by Warner and his team in the UAB Spam Data Mine. &#8220;In this continued difficult economy, these cyber criminals are now preying on victims&#8217; concerns over money, promising Social Security payouts and tax breaks to victims that sign in to the criminals&#8217; fake Social Security Web pages,&#8221; Warner says. The spam messages tell users that there are errors with their Social Security statement then asks them to link to false pages made to look like the Social Security Administration Web site. Warner says the false pages ask users to enter their Social Security numbers before prompting them to download their fake statement. &#8220;The reality is that the download is actually a virus capable of stealing personal information, including bank passwords, from home computers,&#8221; Warner says. &#8220;So once you have completed the login and download, the cyber criminals not only have your Social Security number, they also have infected [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-469","post","type-post","status-publish","format-standard","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beware of New Virus Disguised as Social Security Email<\/title>\n<meta name=\"description\" content=\"Learn about a new virus posing as a Social Security Administration email, designed to steal sensitive information and infect computers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware of New Virus Disguised as Social Security Email\" \/>\n<meta property=\"og:description\" content=\"Learn about a new virus posing as a Social Security Administration email, designed to steal sensitive information and infect computers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-21T07:26:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-09T11:31:59+00:00\" \/>\n<meta name=\"author\" content=\"Spam Prats\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spam Prats\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/\"},\"author\":{\"name\":\"Spam Prats\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"headline\":\"NEW COMPUTER VIRUS DISGUISED AS SOCIAL SECURITY ADMINISTRATION DOWNLOAD\",\"datePublished\":\"2010-01-21T07:26:20+00:00\",\"dateModified\":\"2024-11-09T11:31:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/\"},\"wordCount\":372,\"commentCount\":0,\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/\",\"name\":\"Beware of New Virus Disguised as Social Security Email\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2010-01-21T07:26:20+00:00\",\"dateModified\":\"2024-11-09T11:31:59+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"description\":\"Learn about a new virus posing as a Social Security Administration email, designed to steal sensitive information and infect computers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/new-computer-virus-disguised-as-social-security-administration-download\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NEW COMPUTER VIRUS DISGUISED AS SOCIAL SECURITY ADMINISTRATION DOWNLOAD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\",\"name\":\"Spam Prats\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"caption\":\"Spam Prats\"},\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/admin-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware of New Virus Disguised as Social Security Email","description":"Learn about a new virus posing as a Social Security Administration email, designed to steal sensitive information and infect computers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/","og_locale":"en_US","og_type":"article","og_title":"Beware of New Virus Disguised as Social Security Email","og_description":"Learn about a new virus posing as a Social Security Administration email, designed to steal sensitive information and infect computers.","og_url":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_published_time":"2010-01-21T07:26:20+00:00","article_modified_time":"2024-11-09T11:31:59+00:00","author":"Spam Prats","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spam Prats","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/"},"author":{"name":"Spam Prats","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"headline":"NEW COMPUTER VIRUS DISGUISED AS SOCIAL SECURITY ADMINISTRATION DOWNLOAD","datePublished":"2010-01-21T07:26:20+00:00","dateModified":"2024-11-09T11:31:59+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/"},"wordCount":372,"commentCount":0,"articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/","url":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/","name":"Beware of New Virus Disguised as Social Security Email","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2010-01-21T07:26:20+00:00","dateModified":"2024-11-09T11:31:59+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"description":"Learn about a new virus posing as a Social Security Administration email, designed to steal sensitive information and infect computers.","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/new-computer-virus-disguised-as-social-security-administration-download\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"NEW COMPUTER VIRUS DISGUISED AS SOCIAL SECURITY ADMINISTRATION DOWNLOAD"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498","name":"Spam Prats","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","caption":"Spam Prats"},"url":"https:\/\/ivyproschool.com\/blog\/author\/admin-2\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=469"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/469\/revisions"}],"predecessor-version":[{"id":12504,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/469\/revisions\/12504"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}