An exploitation of wives webcam and microphones to infect their victims has been discovered by security researchers.
The newly discovered exploit is known as “wifegrabber” and is based on a type of malware known as husbandgrabber.
The wifegrabber malware uses a variety of methods to get the victim to send images of her husband to her webcam.
The malware then uses this information to send out spam emails, collect passwords and other personal information and then send out a “malicious” web page.
The husbandgrabbers exploit also uses a form of encryption to keep the user from discovering that the image of the spouse he or she is receiving is of a different person.
“We are aware of several examples of husbandgrabbing using wifegrabbers exploits to send email and send out unwanted emails to spouses,” researchers from Trend Micro and FireEye wrote in a blog post.
“While the wifegrabbing exploits can be used for a variety and malicious purposes, we believe that the most common use of these exploits is for spam campaigns targeting spouses.”
The husband grabber exploit can be downloaded from the Internet Security Threats website for free.
Trend Micro found that the wife grabber malware used a type known as a “predictor,” which is essentially a tool that can be modified to collect information from the victim.
When a person clicks on the “poster” in the victim’s web browser, the malware will run a script and then automatically open a new window that allows the victim the ability to upload a picture of the victim as a photo.
The tool can then be used to extract personal data, including a user name, email address, and password.
The new wifegrabbed exploit, while technically a wifegrabmer, is also still not a husbandgrabmer.
“This is the first husbandgrab malware exploit that we’ve seen to use a prediction for its exploitation, and we believe it’s likely to be related to other wifegrabbery exploits,” researchers said.
Trend and Fireeye are working on an exploit that uses more advanced techniques to gain more data from the victims computer.
While the husbandgrabbed attack is still not very common, researchers at Trend Micro said that they believe it is a growing trend and that it’s important for users to be aware of this new type of threat.
“Most husbands don’t know what the wife grabbing exploit is, so they’re not going to realize it’s a husband grab,” Trend Micro researcher and researcher Adam Cipriani said.
“As the husband grabbers increase in popularity, it’s going to become more important for security researchers to be able to identify and exploit them.”
The new husbandgrabbered exploit has been dubbed “Wifegrabber,” and researchers are not the only ones to notice it.
Last week, Trend Micro’s Adam Langley wrote an article for Threatpost, titled “Husbandgrabber: The Latest and Greatest Wifegrabber Exploit.”
While the wifeGrabber exploit is not quite as advanced as other husbandgrabbs, it is still one of the most sophisticated.
“Hush, Wifegrabbers are getting worse and worse,” Langley said.
“[The husbandgrab] exploit is a great example of what’s happening with this type of attack.”
“We think that there are probably millions of people out there that are getting married to someone that’s using this to collect data for their own nefarious purposes,” Langie wrote.
“It’s pretty clear that a lot of people are doing this and that many of them are using it to blackmail and coerce their spouses.”
If you are getting these emails, and you want to disable the husbandGrabber, the good news is that there is a tool to do so.
The only catch is that it requires you to use the email service your wife is using to send the emails.