Skip to main content

Security Alert: West Texas Malware

April 18, 2013

The latest event in West Texas has spawned attacks utilizing the same attack methods and malware as the Boston Marathon malware attacks. Individuals should be cognizant of any emails that are received from unknown individuals, emails that are received unexpectedly, or for suspicious links found in social media sites.

A number of unscrupulous actors are using the unfortunate incident to spread malware. By exploiting many individuals desire to see video of the event has lead to numerous infections via an iframe within the web site that provides access to YouTube video of the event. Many organizations including Trend Micro, Sohpos, and Kapersky Lab have also released warning regarding the spread of this attack.

It is expected that this type of attack is not relegated to just email dissemination, so additional social media can be expected to be impacted by this attack. Employee's should be made aware of the potential for malicious abuse after any significant event occurs and should observe caution when searching for event information or clicking on links within emails or on any social media site.

Related Blogs

January 25, 2017

Escape and Evasion Egressing Restricted Networks

A command kill chain consists of payload delivery, code execution on a target system, and establishing a command and control (C2) channel outside of a...

See Details

March 08, 2018

Part 2: Frameworks in Context: The Business-Aligned Information Security Program and Control Frameworks

In part 1 of this series, we provided insights responding to the frequent question regarding control frameworks and their place in the security strate...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy


September 19, 2017

Governance Risk and Compliance Services

Optiv works with your organization to optimize its investment in RSA Archer.

See Details

February 06, 2012

Access Governance 101 | Optiv

We will be posting excerpts from select Identity Strategy and Advisory Group (ISAG) briefings. Part 2 below is transcribed from a recent briefing that...

See Details

July 21, 2015

Data Security Solutions

Learn how we can help secure your date throughout its lifecycle.

See Details

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cyber security Events in your area.