We all knew it was going to happen, and that there was nothing we could do to stop it. In fact, it was only a matter of time until the polls had closed and Barack Obama had officially become the President-elect of the United States of America. It is not the election of Obama himself that I am talking about, but rather the inevitable malware that was quick to emerge as a result of that election process.
I stayed up late to watch the results come in, despite not being American, despite living in the UK, like many across the world I have a real interest in the US political landscape. Not least because the small matter of who is President impacts upon my life almost as much as it does yours if you are an American.
And so it was I sat in awe at the historic announcement, at 4am GMT, that Obama had got enough electoral seats to have won the Presidency. So it was at 5am GMT that I wiped away a tear during that truly historic speech.
At 8am GMT I went to bed for a couple of hours of sleep, only to discover when I awoke that my mailbox had already got its first taste of Barack Obama malware in the guise of a spam purporting to have news of the historic events of the night before.
Of course, what you get is a link to a faked up news website which wants you to view video footage of that speech. Something that many who were not able to stay up and watch live might be tempted into doing. No prizes for guessing that those who do will be greeted not with an Adobe Flash video to view, but rather a piece of malware which will vary depending upon exactly what the cybercriminals feel like serving up at that time. What remains constant is that it will come by way of a file that the site says you need to update Adobe Flash in order to view the non-existent video footage.
Sophos tracked one bit of Obama malware, a Trojan complete with rootkit software, backdoor access, data stealing keyloggers and password hunters, to a server in Kiev, Russia.