Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 9 | 10 | (Page 11) | 12 | 13 | .... | 40 | newer

    0 0
  • 04/30/13--12:34: Fake Microsoft Security Scam
  • By Roy Tobin Recently we have seen an increase in fake Microsoft scams, which function by tricking people into thinking that their PC is infected.  With these types of scams there are a number of things to remember. 1.       Microsoft will never call you telling you that your PC is infected 2.       Never allow strangers [...]

    gmilbournebrowser_alertFakeAVWSAremovalgmilbournebrowser_alertFakeAVWSAremoval

    0 0

    By Dancho Danchev Over the last day, cybercriminals have launched yet another massive email campaign to impersonate FedWire in an attempt to trick users into thinking that their wire transfer was processed incorrectly. Once they execute the malicious attachment, their PCs automatically become part of the botnet operated by the cybercriminal/gang of cybercriminals. More details: Sample [...]

    ddanchevFedWire_Email_Spam_Malware_Malicious_Software_Social_Engineering_Botnet_Wire_TransferddanchevFedWire_Email_Spam_Malware_Malicious_Software_Social_Engineering_Botnet_Wire_Transfer

    0 0

    By Dancho Danchev On a regular basis we profile various DIY (do it yourself) releases offered for sale on the underground marketplace with the idea to highlight the re-emergence of this concept which allows virtually anyone obtaining the leaked tools, or purchasing them, to launch targeted malware attacks. Can DIY exploit generating tools be considered [...]

    ddanchevCVE-2013-0422_DIY_Generator_Exploit_Vulnerability_Malware_Malicious_Software_Social_EngineeringCVE-2013-0422_DIY_Generator_Exploit_Vulnerability_Malware_Malicious_Software_Social_Engineering_01ddanchevCVE-2013-0422_DIY_Generator_Exploit_Vulnerability_Malware_Malicious_Software_Social_EngineeringCVE-2013-0422_DIY_Generator_Exploit_Vulnerability_Malware_Malicious_Software_Social_Engineering_01

    0 0

    By Dancho Danchev Everyday, new vendors offering malicious software enter the underground marketplace. And although many will fail to differentiate their underground market proposition in market crowded with reputable, trusted and verified sellers, others will quickly build their reputation on the basis of their “innovative” work, potentially stealing some market share and becoming rich by offering the [...]

    ddanchevDDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_CitadelDDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_01DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_02DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_03DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_04DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_05DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_06DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_07DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_08ddanchevDDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_CitadelDDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_01DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_02DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_03DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_04DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_05DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_06DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_07DDoS_Bot_IRC_HTTP_Bot_Killer_ZeuS_SpyEye_Citadel_08

    0 0

    Recently we have seen an increase in fake installer scams attempting to trick computer users into installing disguised rootkits directly on their machines. In this post, we want to highlight how a scam like this can be installed and infect a machine, including behavior to watch out for as well as how to remedy the situation [...]

    rmelick20135-2-2013 11-37-20 AM5-2-2013 11-37-38 AM5-2-2013 11-37-51 AM5-2-2013 11-38-03 AM5-2-2013 11-39-30 AM5-2-2013 11-39-13 AM5-2-2013 11-38-58 AM5-2-2013 11-38-40 AM5-2-2013 11-38-20 AM5-2-2013 11-39-59 AM5-2-2013 11-39-46 AMrmelick20135-2-2013 11-37-20 AM5-2-2013 11-37-38 AM5-2-2013 11-37-51 AM5-2-2013 11-38-03 AM5-2-2013 11-39-30 AM5-2-2013 11-39-13 AM5-2-2013 11-38-58 AM5-2-2013 11-38-40 AM5-2-2013 11-38-20 AM5-2-2013 11-39-59 AM5-2-2013 11-39-46 AM

    0 0

    By Dancho Danchev Need a compelling reason to perform search engine reconnaissance on your website, for the purpose of securing it against eventual compromise? We’re about to give you a good one. A new version of a well known mass website hacking tool has been recently released, empowering virtually anyone who buys it with the capability to [...]

    ddanchevGoogle_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_InjectionGoogle_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_01Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_02Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_03Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_04Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_05Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_06Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_07Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_08Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_09Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_10Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_11Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_12ddanchevGoogle_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_InjectionGoogle_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_01Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_02Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_03Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_04Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_05Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_06Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_07Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_08Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_09Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_10Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_11Google_Dorks_Mass_Web_Site_Hacking_Tool_XSS_SQL_Injection_12

    0 0

    By Dancho Danchev Over the past 24 hours, we’ve intercepted yet another spam campaign impersonating Citibank in an attempt to socially engineer Citibank customers into thinking that they’ve received a Merchant Billing Statement. Once users execute the malicious attachment found in the fake emails, their PCs automatically join the botnet operated by the cybercriminal/cybercriminals. More details: [...]

    ddanchevCitibank_Merchant_Billing_Statement_Malware_Malicious_Software_Social_Engineering_Botnet_Botnets_TrojanddanchevCitibank_Merchant_Billing_Statement_Malware_Malicious_Software_Social_Engineering_Botnet_Botnets_Trojan

    0 0

    By Dancho Danchev Kindle users, watch what you click on! Cybercriminals are currently mass mailing tens of thousands of fake Amazon “You Kindle E-Book Order” themed emails in an attempt to trick Kindle users into clicking on the malicious links found in these messages. Once they do so, they’ll be automatically exposed to the client-side exploits [...]

    ddanchevAmazon_Kindle_Ebook_Order_Fake_Email_Malware_Malicious_Software_Spam_Spamvertised_Social_EngineeringddanchevAmazon_Kindle_Ebook_Order_Fake_Email_Malware_Malicious_Software_Spam_Spamvertised_Social_Engineering

    0 0

    By Dancho Danchev Cybercriminals are currently spamvertising tens of thousands of bogus emails impersonating New York State’s Department of Motor Vehicles (DMV) in an attempt to trick users into thinking they’ve received an uniform traffic ticket, that they should open, print and send to their town’s court. In reality, once users open and execute the malicious attachment, [...]

    ddanchevNew_York_State_DMV_Uniform_Traffic_Ticket_Fake_Email_Spam_Malware_Malicious_Software_Social_EngineeringddanchevNew_York_State_DMV_Uniform_Traffic_Ticket_Fake_Email_Spam_Malware_Malicious_Software_Social_Engineering

    0 0

    By Nathan Collier We have found a new threat we are calling Android.TechnoReaper. This malware has two parts: a downloader available on the Google Play Market and the spyware app it downloads. The downloaders are disguised as font installing apps, as seen below: Once you install the app, it looks like a nice app used […]

    nathancollierScreenshot1Screenshot2Screenshot3Screenshot4Screenshot6nathancollierScreenshot1Screenshot2Screenshot3Screenshot4Screenshot6

    0 0

    By Dancho Danchev In 2013, Liberty Reserve and Web Money remain the payment method of choice for the majority of Russian/Eastern European cybercriminals. Cybercrime-as-a-Service underground market propositions, malware crypters, R.A.Ts (Remote Access Trojans), brute-forcing tools etc. virtually every underground market product/service is available for purchase through the use of these ubiquitous virtual currencies. What’s the situation on the international underground […]

    ddanchevHTTP_DIY_KeyloggerHTTP_DIY_Keylogger_Admin_PanelddanchevHTTP_DIY_KeyloggerHTTP_DIY_Keylogger_Admin_Panel

    0 0

    By Dancho Danchev On the majority of occasions, Cybercrime-as-a-Service vendors will sell access to malware-infected hosts to virtually anyone who pays for them, without bothering to know what happens once the transaction takes place. A newly launched E-shop for malware-infected hosts, however, has introduced a novel approach for calculating the going rate for the hacked PCs. Basically, […]

    ddanchevHacked_PCs_Malware_Sale_Bots_Botnet_Installs_LoadsddanchevHacked_PCs_Malware_Sale_Bots_Botnet_Installs_Loads

    0 0

    By Dancho Danchev Bitcoin, the digital peer-to-peer based currency, is an attractive target for cybercriminals, who persistently look for new monetization tactics to apply to their massive, but easily generated botnets. Not surprisingly, thanks to the buzz surrounding it, fraudulent Internet actors have begun to look for efficient ways to take advantage of the momentum. A logical […]

    ddanchevGenerator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_04Generator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_CybercrimeGenerator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_01Generator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_02Generator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_03Hidden_Bitcoin_Miner_Sale_Buy_Purchase_CybercrimeHidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_01Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_02Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_04Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_05Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_07Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_08ddanchevGenerator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_04Generator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_CybercrimeGenerator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_01Generator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_02Generator_Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_03Hidden_Bitcoin_Miner_Sale_Buy_Purchase_CybercrimeHidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_01Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_02Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_04Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_05Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_07Hidden_Bitcoin_Miner_Sale_Buy_Purchase_Cybercrime_08

    0 0

    By Dancho Danchev Our sensors just picked up a rogue advertisement served through the Yieldmanager ad network, which exposes users to fake Adobe Flash Player HD ads, ultimately dropping a copy of the potentially unwanted application (PUA)/adware, known as Somoto Better Installer. More details: Sample screenshot of the actual advertisement: Surprisingly, once users click, they’re presented […]

    ddanchevFake_Flash_Player_HD_02_Adware_SomotoFake_Flash_Player_HD_01_Adware_SomotoFake_Flash_Player_HD_Adware_SomotoBetterInstallerSomoto_BetterInstallerddanchevFake_Flash_Player_HD_02_Adware_SomotoFake_Flash_Player_HD_01_Adware_SomotoFake_Flash_Player_HD_Adware_SomotoBetterInstallerSomoto_BetterInstaller

    0 0

    By Cameron Palan and Nathan Collier Recently, we discovered a new malicious Android application called Android.MouaBot. This malicious software is a bot contained within another basic app; in this case, a Chinese calculator application. Behind the scenes, it automatically sends an SMS message to an auto-reply number which replies back to the phone with a […]

    nathancollierpic1pic2pic3nathancollierpic1pic2pic3

    0 0

    By Nathan Collier Android.RoidSec has the package name “cn.phoneSync”, but an application name of “wifi signal Fix”. From a ‘Malware 101′ standpoint, you would think the creators would have a descriptive package name that matches the application name. Not so, in this case. So what is Android.RoidSec? It’s a nasty, malicious app that sits in […]

    nathancollierScreenshot1Screenshot2nathancollierScreenshot1Screenshot2

    0 0

    By Dancho Danchev The gang of cybercriminals behind the ‘Magic Malware‘ has launched yet another malicious spam campaign, attempting to trick U.K users into thinking they’ve received a notification for a “New MMS” message. In reality, once users execute the malicious attachment, it will download and drop additional malware on the affected hosts, giving the cybercriminals […]

    ddanchevddanchev

    0 0

    By Dancho Danchev Trust is vital. It’s also the cornerstone for the growth of E-commerce in general, largely thanks to the mass acceptable of a trusted model for processing financial data and personally identifiable information. For years, the acceptance and mass implementation of PKI (Public Key Infrastructure) has been a driving force that resulted in a pseudo-secure […]

    ddanchevRootkit_Ring3_Form_Grabbing_Malware_Malicious_SoftwareRootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_01Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_02Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_03Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_04Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_05Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_06ddanchevRootkit_Ring3_Form_Grabbing_Malware_Malicious_SoftwareRootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_01Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_02Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_03Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_04Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_05Rootkit_Ring3_Form_Grabbing_Malware_Malicious_Software_06

    0 0

    By Dancho Danchev With more Web-based DIY malware crypters continuing to pop up online, both novice and experienced cybercriminals can easily obfuscate any malicious sample into an undetected — through signatures based scanning not behavioral detection — piece of malware, successfully bypassing perimeter based defenses currently in place. In this post I’ll profile a recently launched service, […]

    ddanchevDIY_Web_Malware_Malicious_Software_Executable_CryptingDIY_Web_Malware_Malicious_Software_Executable_Crypting_01ddanchevDIY_Web_Malware_Malicious_Software_Executable_CryptingDIY_Web_Malware_Malicious_Software_Executable_Crypting_01

    0 0

    By Dancho Danchev Want to join the North Atlantic Treaty Organization (NATO)? You may want to skip the CVs/personally identifiable information soliciting campaign that I’m about to profile in this post, as you’d be involuntarily sharing your information with what looks like an intelligence gathering operation. More details: Sample screenshot of the fake NATO Employment Application Form: A copy […]

    ddanchevFake_NATO_Employment_ApplicationddanchevFake_NATO_Employment_Application

older | 1 | .... | 9 | 10 | (Page 11) | 12 | 13 | .... | 40 | newer