Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 8 | 9 | (Page 10) | 11 | 12 | .... | 40 | newer

    0 0

    By Dancho Danchev Among the first things a cybercriminal will (automatically) do, once they gain access to a compromised host, is to retrieve account/credential data. From compromised FTP credentials, CPanel accounts, portfolios of domains, to hacked PayPal and Steam accounts, cybercriminals are actively utilizing compromised infrastructure as a foundation for the success of their fraudulent or malicious campaigns, as [...]

    ddanchevHacked_Compromised_Accounts_For_Sale_Vkontakte_LiveJournal_Twitter_MailRu_SkypeddanchevHacked_Compromised_Accounts_For_Sale_Vkontakte_LiveJournal_Twitter_MailRu_Skype

    0 0

    By Dancho Danchev Over the past few days, we intercepted a malware campaign that spreads through Skype messages, exclusively coming from malware-infected friends or colleagues. Once users click on the shortened link, they’ll be exposed to a simple file download box, with the cybercriminals behind the campaign directly linking to the malicious executable. More details: [...]

    ddanchevSkype_Spreading_Malware_Social_EngineeringddanchevSkype_Spreading_Malware_Social_Engineering

    0 0

    By Dancho Danchev Over the last couple of years, the industry’s and the media’s attention has been shifting from mass widespread malware campaigns to targeted attacks most commonly targeting human rights organizations, governments and the military, also known as advanced persistent threats (APTs). In this post, I’ll profile a recently spotted underground market advertisement, which [...]

    ddanchevBusiness_Cards_Corporate_Database_Contacts_CybercrimeddanchevBusiness_Cards_Corporate_Database_Contacts_Cybercrime

    0 0

    By Dancho Danchev In a diversified underground marketplace, where multiple market players interact with one another on a daily basis, there are the “me too” developers, and the true “innovators” whose releases have the potential to cause widespread damage, ultimately resulting in huge financial losses internationally. In this post, I’ll profile one such underground market [...]

    ddanchevZerokit_0kit_ring0_bundleZerokit_0kit_ring0_bundle_01Zerokit_0kit_ring0_bundle_02Zerokit_0kit_ring0_bundle_03Zerokit_0kit_ring0_bundle_04Zerokit_0kit_ring0_bundle_05Zerokit_0kit_ring0_bundle_06Zerokit_0kit_ring0_bundle_07ddanchevZerokit_0kit_ring0_bundleZerokit_0kit_ring0_bundle_01Zerokit_0kit_ring0_bundle_02Zerokit_0kit_ring0_bundle_03Zerokit_0kit_ring0_bundle_04Zerokit_0kit_ring0_bundle_05Zerokit_0kit_ring0_bundle_06Zerokit_0kit_ring0_bundle_07

    0 0

    By Dancho Danchev Thanks to the ease of generating a botnet, in 2013, stolen accounting data on a mass scale is a no longer a hot underground item, it’s a commodity, one that’s being offered by virtually all participants in the cybercrime ecosystem. What happens once a Skype account gets compromised? There are several possible [...]

    ddanchevDIY_Skype_Rings_FlooderDIY_Skype_Rings_Flooder_01ddanchevDIY_Skype_Rings_FlooderDIY_Skype_Rings_Flooder_01

    0 0

    By Dancho Danchev Cybercriminals are currently mass mailing tens of thousands of emails, in an attempt to trick users into thinking that the order for their “air transportation services has been accepted and processed”. In reality though, once users execute the malicious attachments, their PCs will automatically become part of the botnet managed by the [...]

    ddanchevFake_Helicopter_Order_Email_Spam_Malware_Social_EngineeringddanchevFake_Helicopter_Order_Email_Spam_Malware_Social_Engineering

    0 0

    By Dancho Danchev What’s greed to some cybercriminals, is profit maximization to others, especially in times when we’re witnessing the maturing state of the modern cybercrime ’enterprise’. Many enter this vibrant marketplace as vendors without really realizing that, thanks to the increasing transparency within the cybercrime ecosystem, their basic and valued added services will be directly benchmarked [...]

    ddanchevPrivate_Keylogger_2012_CybercrimePrivate_Keylogger_2012_Cybercrime_01Private_Keylogger_2012_Cybercrime_02ddanchevPrivate_Keylogger_2012_CybercrimePrivate_Keylogger_2012_Cybercrime_01Private_Keylogger_2012_Cybercrime_02

    0 0

    By Adam McNeil With all the recent media coverage and extreme changes of the BitCoin value, it should come as no surprise that malware authors are trying to capitalize on the trends.  These people attempt to make money on all sorts of digital transactions and it’s probably a safe bet to expect their rapid expansion [...]

    gmilbourneBitCoinJacker-StealMeMoneyBitCoinJacker-CodegmilbourneBitCoinJacker-StealMeMoneyBitCoinJacker-Code

    0 0

    By Dancho Danchev Cybercriminals are currently spamvertising tens of thousands of emails impersonating American Airlines in an attempt to trick its customers into thinking that they’ve received a download link for their E-ticket. Once they download and execute the malicious attachment, their PCs automatically join the botnet operated by the cybercriminal/gang of cybercriminals behind the campaign. More details: [...]

    ddanchevAmerican_Airlines_Email_Spam_Malware_Malicious_Software_Social_EngineeringddanchevAmerican_Airlines_Email_Spam_Malware_Malicious_Software_Social_Engineering

    0 0

    By Dancho Danchev In times when modern cybercriminals take advantage of the built-in SMTP engines in their malware platforms, as well as efficient and systematic abuse of Web-based email service providers for mass mailing fraudulent or malicious campaigns, others seem to be interested in the resurrection of an outdated, but still highly effective way to [...]

    ddanchevSMTP_Server_Spam_Sale_Underground_Market_2013_01SMTP_Server_Spam_Sale_Underground_Market_2013_02SMTP_Server_Spam_Sale_Underground_Market_2013_03SMTP_Server_Spam_Sale_Underground_Market_2013_04SMTP_Server_Spam_Sale_Underground_Market_2013_05SMTP_Server_Spam_Sale_Underground_Market_2013_06SMTP_Server_Spam_Sale_Underground_Market_2013_07ddanchevSMTP_Server_Spam_Sale_Underground_Market_2013_01SMTP_Server_Spam_Sale_Underground_Market_2013_02SMTP_Server_Spam_Sale_Underground_Market_2013_03SMTP_Server_Spam_Sale_Underground_Market_2013_04SMTP_Server_Spam_Sale_Underground_Market_2013_05SMTP_Server_Spam_Sale_Underground_Market_2013_06SMTP_Server_Spam_Sale_Underground_Market_2013_07

    0 0

    By Dancho Danchev Just as we anticipated earlier this year in our “How mobile spammers verify the validity of harvested phone number” post, mobile spammers and cybercriminals in general will continue ensuring that QA (Quality Assurance) is applied to their upcoming campaigns. This is done in an attempt to both successfully reach a wider audience and to [...]

    ddanchevDIY_Mobile_Phone_Number_Harvesting_Tool_USB_ModemDIY_Mobile_Phone_Number_Harvesting_Tool_USB_Modem_01ddanchevDIY_Mobile_Phone_Number_Harvesting_Tool_USB_ModemDIY_Mobile_Phone_Number_Harvesting_Tool_USB_Modem_01

    0 0

    By Dancho Danchev In an attempt to add an additional layer of legitimacy to their malicious software, cybercriminals sometimes simply reposition them as Remote Access Tools, also known as R.A.Ts. What they seem to be forgetting is that, no legitimate Remote Access Tool would posses any spreading capabilities, plus, has the capacity to handle tens of [...]

    ddanchevCommercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_RootkitCommercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_01Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_02Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_03Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_04Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_05Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_06Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_07Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_08Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_09Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_10Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_11Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_12Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_13Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_14Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_15Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_16Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_17Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_18Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_19Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_20ddanchevCommercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_RootkitCommercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_01Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_02Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_03Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_04Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_05Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_06Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_07Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_08Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_09Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_10Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_11Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_12Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_13Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_14Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_15Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_16Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_17Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_18Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_19Commercial_Private_RAT_Remote_Access_Tool_Trojan_Horse_Malware_Rootkit_20

    0 0

    By Dancho Danchev Earlier this year we profiled a newly released mobile/phone number harvesting application, a common tool in the arsenal of mobile spammers, as well as vendors of mobile spam services. Since the practice is an inseparable part of the mobile spamming process, cybercriminals continue periodically releasing new mobile number harvesting applications, update their features, but most interestingly, [...]

    ddanchevRussian_Mobile_Number_HarvesterddanchevRussian_Mobile_Number_Harvester

    0 0

    By Dancho Danchev Over the past year, we observed an increase in publicly available managed TDoS (Telephony Denial of Service) services. We attribute this increase to the achieved ‘malicious economies of scale’ on behalf of the cybercriminals operating them, as well as the overall availability of proprietary/public DIY phone ring/SMS-based TDoS tools. What are cybercriminals up to in terms of [...]

    ddanchevSIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_FlooderSIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_Flooder_01SIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_Flooder_02SIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_Flooder_03ddanchevSIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_FlooderSIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_Flooder_01SIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_Flooder_02SIP_Based_TDoS_Denial_of_Service_DoS_Phone_Mobile_Number_Checker_Flooder_03

    0 0

    By Dancho Danchev Just how challenged are cybercriminals when they’re being exposed to CAPTCHAs in 2013? Not even bothering to “solve the problem” by themselves anymore, thanks to the cost-efficient, effective, and fully working process of outsourcing the CAPTCHA solving process to humans thereby allowing the cybercriminals to abuse any given Web property, as if it were multiple [...]

    ddanchevDIY_Russian_Email_Account_Registration_Tool_CAPTCHADIY_Russian_Email_Account_Registration_Tool_CAPTCHA_01DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_02DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_03DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_04DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_05DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_06DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_07DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_08DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_09DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_10ddanchevDIY_Russian_Email_Account_Registration_Tool_CAPTCHADIY_Russian_Email_Account_Registration_Tool_CAPTCHA_01DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_02DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_03DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_04DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_05DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_06DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_07DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_08DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_09DIY_Russian_Email_Account_Registration_Tool_CAPTCHA_10

    0 0

    By Dancho Danchev Following the recent events, opportunistic cybercriminals have been spamvertising tens of thousands of malicious emails in an attempt to capitalize on on the latest breaking news. We’re currently aware of two “Boston marathon explosion” themed campaigns that took place last week, one of which is impersonating CNN, and another is using the “fertilizer plant [...]

    ddanchevTexas_Fertilizer_ExplosionddanchevTexas_Fertilizer_Explosion

    0 0

    By Dancho Danchev Over the past couple of days, cybercriminals have launched two consecutive malware campaigns impersonating DHL in an attempt to trick users into thinking that they’ve received a parcel delivery notification. The first campaign comes with a malicious attachment, whereas in the second, the actual malicious archive is located on a compromised domain. [...]

    ddanchevFake_DHL_Delivery_Notification_Email_Spam_Malware_Social_EngineeringFake_DHL_Delivery_Notification_Email_Spam_Malware_Social_Engineering_01ddanchevFake_DHL_Delivery_Notification_Email_Spam_Malware_Social_EngineeringFake_DHL_Delivery_Notification_Email_Spam_Malware_Social_Engineering_01

    0 0

    By Dancho Danchev Relying on tens of thousands of fake “Your transaction is completed” emails, cybercriminals have just launched yet another malicious spam campaign attempting to socially engineer Bank of America’s (BofA) customers into executing a malicious attachment. Once unsuspecting users do so, their PCs automatically join the botnet operated by the cybercriminal/gang of cybercriminals operating [...]

    ddanchevBank_of_America_BofA_Email_Spam_Social_Engineering_Malware_Malicious_Software_BotnetddanchevBank_of_America_BofA_Email_Spam_Social_Engineering_Malware_Malicious_Software_Botnet

    0 0

    By Dancho Danchev How are cybercriminals most commonly abusing legitimate Web traffic? On the majority of occasions, some will either directly embed malicious iFrames on as many legitimate Web sites as possible, target server farms and the thousands of customers that they offer services to, or generate and upload invisible doorways on legitimate, high pagerank-ed Web properties, in an attempt [...]

    ddanchevDIY_Doorway_Generator_Web_Shells_Quality_AssuranceDIY_Doorway_Generator_Web_Shells_Quality_Assurance_01DIY_Doorway_Generator_Web_Shells_Quality_Assurance_02DIY_Doorway_Generator_Web_Shells_Quality_Assurance_03DIY_Doorway_Generator_Web_Shells_Quality_Assurance_04DIY_Doorway_Generator_Web_Shells_Quality_Assurance_05DIY_Doorway_Generator_Web_Shells_Quality_Assurance_06DIY_Doorway_Generator_Web_Shells_Quality_Assurance_07DIY_Doorway_Generator_Web_Shells_Quality_Assurance_08ddanchevDIY_Doorway_Generator_Web_Shells_Quality_AssuranceDIY_Doorway_Generator_Web_Shells_Quality_Assurance_01DIY_Doorway_Generator_Web_Shells_Quality_Assurance_02DIY_Doorway_Generator_Web_Shells_Quality_Assurance_03DIY_Doorway_Generator_Web_Shells_Quality_Assurance_04DIY_Doorway_Generator_Web_Shells_Quality_Assurance_05DIY_Doorway_Generator_Web_Shells_Quality_Assurance_06DIY_Doorway_Generator_Web_Shells_Quality_Assurance_07DIY_Doorway_Generator_Web_Shells_Quality_Assurance_08

    0 0

    By Dancho Danchev In 2013, you no longer need to posses sophisticated programming skills to manage a ransomware botnet, potentially tricking tens of thousands of gullible users, per day, into initiating a micro-payment to pay the ransom for having their PC locked down. You’ve got managed ransomware services doing it for you. In this post I’ll profile a recently [...]

    ddanchevRussian_Ransomware_Source_Code_For_SaleRussian_Ransomware_Source_Code_For_Sale._01Russian_Ransomware_Source_Code_For_Sale._02ddanchevRussian_Ransomware_Source_Code_For_SaleRussian_Ransomware_Source_Code_For_Sale._01Russian_Ransomware_Source_Code_For_Sale._02

older | 1 | .... | 8 | 9 | (Page 10) | 11 | 12 | .... | 40 | newer