Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 10 | 11 | (Page 12) | 13 | 14 | .... | 40 | newer

    0 0

    By Dancho Danchev Just as we anticipated in our previous analysis of a commercially available Bitcoin miner, cybercriminals continue “innovating” on this front by releasing more advanced and customizable invisible Bitcoin miners for fellow cybercriminals to take advantage of. In this post, we’ll profile yet another invisible Bitcoin miner, once again available for purchase on the international cybercrime-friendly marketplace, emphasize on […]

    ddanchevInvisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_02Invisible_BitCoin_Miner_Commercial_Buy_Purchase_PriceInvisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_01Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_03Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_04Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_05Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_06Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_07Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_08Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_09Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_10ddanchevInvisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_02Invisible_BitCoin_Miner_Commercial_Buy_Purchase_PriceInvisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_01Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_03Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_04Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_05Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_06Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_07Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_08Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_09Invisible_BitCoin_Miner_Commercial_Buy_Purchase_Price_10

    0 0

    By Dancho Danchev We have just intercepted yet another currently ongoing malicious spam campaign, enticing users into executing a fake Export License/Payment Invoice. Once gullible and socially engineering users do so, their PCs automatically join the botnet operated by the cybercriminals. More details: Detection rate for the malicious executable: MD5: 4e7dc191117a6f30dd429cc619041552 – detected by 33 out […]

    ddanchevddanchev

    0 0

    By Israel Chavarria Recently we have seen a spike of this ransomware in the wild and it appears as though its creators are not easily giving up. This infection takes your computer hostage and makes it look as though the authorities are after you, when in reality this is all just an elaborate attempt to […]

    rmelick2013fbicyberdivnl1ukromaniarmelick2013fbicyberdivnl1ukromania

    0 0

    By Dancho Danchev Our sensors recently picked up a Web site infection, affecting the Web site of the Ministry of Micro And Medium Enterprises (MSME DI Jaipur). And although the Black Hole Exploit Kit serving URL is currently not accepting any connections, it’s known to have been used in previous client-side exploit serving campaigns. Let’s profile the […]

    ddanchevIndian_Government_Web_Site_Hacked_Compromised_Black_Hole_Exploit_Kit_01Indian_Government_Web_Site_Hacked_Compromised_Black_Hole_Exploit_KitddanchevIndian_Government_Web_Site_Hacked_Compromised_Black_Hole_Exploit_Kit_01Indian_Government_Web_Site_Hacked_Compromised_Black_Hole_Exploit_Kit

    0 0

    By Dancho Danchev Over the past week, the cybercriminals behind the recently profiled ‘Citibank Merchant Billing Statement‘ themed campaign, resumed operations, and launched yet another massive spam campaign impersonating Citibank, in an attempt to trick its customers into executing the malicious attachment found in the fake emails. More details: Sample screenshot of the spamvertised email: […]

    ddanchevFake_Email_Spam_Citibank_Merchant_Billing_Statement_MalwareddanchevFake_Email_Spam_Citibank_Merchant_Billing_Statement_Malware

    0 0

    By Dancho Danchev Largely thanks to the increasing availability of easy to use DIY (do-it-yourself) DDoS bots, we continue to observe an increase in international cybercrime-friendly market propositions for ‘DDoS for hire’ services. And whereas these services can never match the bandwidth capabilities and vendor experience offered by their Russian/Eastern European counterparts, they continue to […]

    ddanchevMarijuana_Ganga_Pot_Weed_DDoS_For_HireMarijuana_Ganga_Pot_Weed_DDoS_For_Hire_01ddanchevMarijuana_Ganga_Pot_Weed_DDoS_For_HireMarijuana_Ganga_Pot_Weed_DDoS_For_Hire_01

    0 0

    By Dancho Danchev We have just intercepted yet another spamvertised malware serving campaign, this time impersonating Vodafone U.K, in an attempt to trick the company’s customers into thinking that they’ve received an image. In reality, once users execute the malicious attachments, their PCs automatically join the botnet operated by the cybercriminal. More details: Detection rate […]

    ddanchevddanchev

    0 0

    By Dancho Danchev Utilizing the very best in ‘malicious economies of scale’ concepts, cybercriminals have recently released a privilege-escalating Web-controlled mass iFrame embedding platform that’s not just relying on compromised FTP/SSH accounts, but also automatically gains root access on the affected servers in an attempt to target each and every site hosted there. Similar to […]

    ddanchevMass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_CybercrimeMass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_01Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_02Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_03Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_04Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_05Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_06Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_07Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_08Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_09Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_10Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_11Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_12Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_14Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_13Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_15Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_16Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_17Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_18Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_19Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_20Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_21Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_22Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_23Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_24Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_25Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_26Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_27Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_28Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_29Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_30Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_31ddanchevMass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_CybercrimeMass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_01Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_02Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_03Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_04Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_05Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_06Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_07Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_08Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_09Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_10Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_11Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_12Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_14Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_13Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_15Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_16Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_17Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_18Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_19Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_20Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_21Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_22Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_23Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_24Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_25Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_26Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_27Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_28Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_29Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_30Mass_iFraming_SSH_FTP_Web_Server_CMS_Malware_Exploits_Root_Cybercrime_31

    0 0

    By Dancho Danchev Remember the E-shop offering access to hacked PCs, based on malware ‘executions’ that we profiled last month? We have recently spotted a newly launched, competing E-shop, once again selling access to hacked PCs worldwide, based on malware ‘executions’. However, this time, there’s no limit to the use of (competing) bot killers, meaning […]

    ddanchevE-Shop_Hacked_Compromised_PCs_Hosts_MalwareE-Shop_Hacked_Compromised_PCs_Hosts_Malware_01ddanchevE-Shop_Hacked_Compromised_PCs_Hosts_MalwareE-Shop_Hacked_Compromised_PCs_Hosts_Malware_01

    0 0

    By Dancho Danchev Opportunistic pharmaceutical scammers are currently spamvertising tens of thousands of bogus emails impersonating Facebook’s Notification System in an attempt to trick users into clicking on the links, supposedly coming from a trusted source. Once users click on the links found in the fake emails, they’re exposed to counterfeit pharmaceutical items available for purchase […]

    ddanchevFacebook_Notification_Fake_Bogus_Pharmaceutical_Scam_01Facebook_Notification_Fake_Bogus_Pharmaceutical_ScamddanchevFacebook_Notification_Fake_Bogus_Pharmaceutical_Scam_01Facebook_Notification_Fake_Bogus_Pharmaceutical_Scam

    0 0

    By Dancho Danchev Our sensors recently picked up an advertisement using Yieldmanager’s ad network, enticing users into downloading the iLivid PUA (Potentially Unwanted Application) on their PCs. Operated by Bandoo Media Inc., the application installs the privacy invading “Searchqu Toolbar”. More details: Sample screenshot of the advertisement: Sample screenshot of the download page: Detection rate for iLivid – MD5: 468bbe0dc83496cad49597a47341c786 - detected […]

    ddancheviLivid_SearchSuite_PUA_Rogue_Advertisement_YieldmanageriLivid_SearchSuite_PUA_Rogue_Advertisement_Yieldmanager_01iLivid_SearchSuite_PUA_Rogue_Advertisement_Yieldmanager_02iLivid_SearchSuite_PUA_Rogue_Advertisement_Yieldmanager_03ddancheviLivid_SearchSuite_PUA_Rogue_Advertisement_YieldmanageriLivid_SearchSuite_PUA_Rogue_Advertisement_Yieldmanager_01iLivid_SearchSuite_PUA_Rogue_Advertisement_Yieldmanager_02iLivid_SearchSuite_PUA_Rogue_Advertisement_Yieldmanager_03

    0 0

    By Dancho Danchev Aiming to capitalize on the multi-billion gaming market, cybercriminals actively data mine their botnets for accounting credentials, not just for popular gaming platforms, but also the actual activation keys for some of the most popular games on the market. A newly launched e-shop aims to monetize stolen accounting credentials, not just for […]

    ddanchevHacked_Accounts_For_SaleddanchevHacked_Accounts_For_Sale

    0 0

    By Dancho Danchev Opportunistic scammers have just launched a targeted spam campaign impersonating the UN Refugee Agency (UNHCR) in an attempt to trick users into handing over their complete credit card details as they supposedly make a donation to support Syria’s refugees. Needless to say, this scam is seeking full access to your credit card details through a fraudulent […]

    ddanchevSyria_Fake_Bogus_Fraudulent_Donation_Site_Campaign_Agency_UNHCR_Scam_Fraud_Credit_Card_02Syria_Fake_Bogus_Fraudulent_Donation_Site_Campaign_Agency_UNHCR_Scam_Fraud_Credit_CardSyria_Fake_Bogus_Fraudulent_Donation_Site_Campaign_Agency_UNHCR_Scam_Fraud_Credit_Card_01ddanchevSyria_Fake_Bogus_Fraudulent_Donation_Site_Campaign_Agency_UNHCR_Scam_Fraud_Credit_Card_02Syria_Fake_Bogus_Fraudulent_Donation_Site_Campaign_Agency_UNHCR_Scam_Fraud_Credit_CardSyria_Fake_Bogus_Fraudulent_Donation_Site_Campaign_Agency_UNHCR_Scam_Fraud_Credit_Card_01

    0 0

    By Dancho Danchev Have you sent an eFax recently? Watch out for an ongoing malicious spam campaign that tries to convince you that there’s been an unsuccessful fax transmission. Once socially engineered users execute the malicious attachment found in the fake emails, their PCs automatically join the botnet of the cybercriminals behind the campaign. More […]

    ddanchevFake_Bogus_Email_Spam_eFax_Unsuccessful_Fax_Transmission_Malware_Malicious_Software_Social_EngineeringddanchevFake_Bogus_Email_Spam_eFax_Unsuccessful_Fax_Transmission_Malware_Malicious_Software_Social_Engineering

    0 0

    By Dan Para It seems simple enough, I want to install Adobe Flash Player so I search for “flash player download and click on the first result, right? Ignoring the second link which doesn’t have a five star rating and 37 reviews, I’m brought to a page called downloadinfo.com. I click the download button, click […]

    rmelick2013search1downloadinfooptimum downloaderrealplayerSolid SavingsUnit LayersOptimizer ProInstallingGoogle ToolbarVLC Player - whatoptional software includedrmelick2013search1downloadinfooptimum downloaderrealplayerSolid SavingsUnit LayersOptimizer ProInstallingGoogle ToolbarVLC Player - whatoptional software included

    0 0

    By Dancho Danchev Fraudsters are currently spamvertising tens of thousands of emails enticing users into installing rogue, potentially unwanted (PUAs) casino software. Most commonly known as W32/Casonline, this scam earns revenue through the rogue online gambling software’s affiliate network. More details: Sample screenshots of the landing URLs: Spamvertised URLs: hxxp://luckynuggetcasino.com – 67.211.111.163 hxxp://888casino.com – 213.52.252.59 hxxp://spinpalace.com – 109.202.114.65 hxxp://alljackpotscasino.com – […]

    ddanchevEmail_Spam_Fake_Rogue_PUA_Casino_CasonlineEmail_Spam_Fake_Rogue_PUA_Casino_Casonline_02Email_Spam_Fake_Rogue_PUA_Casino_Casonline_03Email_Spam_Fake_Rogue_PUA_Casino_Casonline_04Email_Spam_Fake_Rogue_PUA_Casino_Casonline_05Email_Spam_Fake_Rogue_PUA_Casino_Casonline_01ddanchevEmail_Spam_Fake_Rogue_PUA_Casino_CasonlineEmail_Spam_Fake_Rogue_PUA_Casino_Casonline_02Email_Spam_Fake_Rogue_PUA_Casino_Casonline_03Email_Spam_Fake_Rogue_PUA_Casino_Casonline_04Email_Spam_Fake_Rogue_PUA_Casino_Casonline_05Email_Spam_Fake_Rogue_PUA_Casino_Casonline_01

    0 0

    By Dancho Danchev Our sensors just picked up yet another rogue ad enticing users into installing the SafeMonitorApp, a potentially unwanted application (PUA) that socially engineers users into giving away their privacy through deceptive advertising of the rogue application’s “features”. More details: Sample screenshot of the landing page, featuring a bogus ‘Norton Secured’ Seal: Sample screenshot […]

    ddanchevSafeMonitorApp_PUA_01SafeMonitorApp_PUAddanchevSafeMonitorApp_PUA_01SafeMonitorApp_PUA

    0 0

    By Dancho Danchev In 2013, the use of basic Quality Assurance (QA) practices has become standard practice for cybercrininals when launching a new campaign. In an attempt to increase the probability of a successful outcome for their campaigns — think malware infection, increased visitor-to-malware infected conversion, improved conversion of blackhat SEO acquired traffic leading to the purchase of counterfeit pharmaceutical items etc. — […]

    ddanchevCybercrime_Malware_Malicious_Software_Multiple_Antivirus_Scanners_Desktop_ScannerCybercrime_Malware_Malicious_Software_Multiple_Antivirus_Scanners_Desktop_Scanner_01ddanchevCybercrime_Malware_Malicious_Software_Multiple_Antivirus_Scanners_Desktop_ScannerCybercrime_Malware_Malicious_Software_Multiple_Antivirus_Scanners_Desktop_Scanner_01

    0 0

    By Nathan Collier There’s one variant of Android.Bankun that is particularly interesting to me.  When you look at the manifest it doesn’t have even one permission.  Even wallpaper apps have internet permissions.  Having no permissions isn’t a red flag for being malicious though.  In fact, it may even make you lean towards it being legitimate. […]

    nathancollier7-2-2013 2-03-42 PM7-2-2013 2-03-57 PM7-2-2013 2-04-03 PM7-2-2013 2-04-14 PM7-2-2013 2-04-21 PM7-2-2013 2-04-28 PM7-2-2013 2-04-40 PM7-2-2013 2-04-49 PM7-2-2013 2-04-57 PMnathancollier7-2-2013 2-03-42 PM7-2-2013 2-03-57 PM7-2-2013 2-04-03 PM7-2-2013 2-04-14 PM7-2-2013 2-04-21 PM7-2-2013 2-04-28 PM7-2-2013 2-04-40 PM7-2-2013 2-04-49 PM7-2-2013 2-04-57 PM

    0 0

    By Dancho Danchev We’ve just intercepted yet another campaign serving deceptive ads, this time targeting German-speaking users into downloading and installing the privacy-invading ‘FLV Player’ Potentially Unwanted Application (PUA), part of Somoto’s pay-per-install network. More details: Sample screenshot of the actual rogue ad telling users that they should update their current media player: Sample screenshot […]

    ddanchevPUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayer_01PUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayerPUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayer_02PUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayer_03ddanchevPUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayer_01PUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayerPUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayer_02PUA_Potentially_Unwanted_Application_Rogue_Fake_Video_Player_Media_Player_FLVPlayer_03

older | 1 | .... | 10 | 11 | (Page 12) | 13 | 14 | .... | 40 | newer