It may resemble massive August campaign that touted CNN, MSNBC video Users should be on guard for spam touting the guilty verdict of former professional football star O.J. Simpson, a security company warned today.“Anytime there’s a big news story, spammers latch on to it to get people to click on a link and download their malware,” said Sam Masiello, vice president of information security at MX Logic Inc.Although MX Logic has not yet spotted any Simpson-related spam, Masiello said that company researchers have found evidence of an impending campaign. “We’ve seen poisoned search results on [Microsoft Corp.’s ] Live Search that lead to some Live Spaces hosting fake video codecs,” said Masiello. The tactic, dubbed “search engine poisoning,” is frequently used alongside malware spam.Hackers try to dupe search engines into ranking malicious sites at or near the top of the results list by flooding blogs and message boards with bogus entries added by automated bots. “They’ll use anything they can to pump up the search engine results,” said Masiello. The most likely Simpson spam strategy would resemble the massive August campaigns that lured users to malware-hosting sites by promising video clips from the CNN and MSNBC cable news channels, Masiello said. At the time, criminals tricked people into downloading attack code by telling them that the file was a codec required to play the video.“Based on the results we’ve already seen, I think [a spam campaign] is pretty imminent, and very likely,” Masiello added. O.J. Simpson, 61, was found guilty late last Friday by a Las Vegas jury on multiple charges stemming from the armed robbery of two sports memorabilia dealers in 2007. The verdict was handed down 13 years to the day after Simpson was acquitted of the murders of his former wife, Nicole Brown Simpson, and her friend, Ronald Goldman.Simpson, scheduled for sentencing Dec. 5, faces life in prison. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe