Washington, Jan 05 (Agencies): It looked like an innocent e-mail Christmas card from the White House.But the holiday greeting that surfaced just before Christmas was a ruse by cyber criminals to steal documents and other data from law enforcement, military and Government workers—particularly those involved in computer crime investigations.

Analysts who have studied the malicious software said on Tuesday that hackers were able to use the e-mail to collect sensitive law enforcement data. But so far there has been no evidence that any classified information was compromised.

The targeted e-mail attack comes as the Federal Government is desperately trying to beef up its cyber security after the release of thousands of State Department cables and military documents by the WikiLeaks website.

Federal authorities want to improve technology systems and crack down on employees to prevent the theft or loss of classified and sensitive information.

The red holiday e-mail card, with its brightly decorated Christmas tree, prompted recipients to click on a link, which would then download the ZueS malware—a well-known malicious code that is often used to steal passwords and other online credentials, primarily to poach Internet banking information.

The malware was created several years ago and is widely available for criminals to acquire and adapt. It has been used to steal millions of dollars.

In this case, however, the code downloaded a second payload that is designed to steal documents from the recipient's computer, accessing Microsoft Word and Excel files.

Analysts learned of the e-mail attack last week and have spoken with federal authorities about it.
Homeland Security Department spokeswoman Amy Kudwa said officials are aware of the ZueS e-mail and are monitoring it along with other similar malware attacks that have been tracked for some time.

The e-mail attack, underscores the continuing vulnerability of Government workers and their computer systems to versions of the ZueS malware. Hackers can easily tweak the code each time so that it does not trigger antivirus software.

While ZueS-related attacks are fairly common, this latest one stood out because of the use of the White House connection to lure recipients in and the targeted way it went after law enforcement, analysts said.

One US official said the code was rather poorly written. The hackers could only get easily accessible documents and not those filed deep within layers of folders on the hard drive, said the official, who spoke on condition of anonymity to discuss ongoing investigations.