Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 3 | 4 | (Page 5) | 6 | 7 | .... | 40 | newer

    0 0

    By Dancho Danchev Cybercriminals are currently spamvertising millions of emails impersonating the Better Business Bureau (BBB), in an attempt to trick users into clicking on a link to a non-existent report. Upon clicking on the link, users are exposed to the client-side exploits served by the latest version of the Black Hole Exploit Kit. More [...]

    ddanchevBetter_Business_Bureau_Email_Spam_Exploits_MalwareddanchevBetter_Business_Bureau_Email_Spam_Exploits_Malware

    0 0

    By Dancho Danchev Cybercriminals are currently mass mailing millions of emails trying to trick recipients into executing malicious attachments pitched as recently arrived fax messages. Upon running the malicious executables, users are exposed to a variety of dropped malware variants in a clear attempt by the cybercriminals to add additional layers of monetization to the [...]

    ddancheveFax_Corporate_Email_Spam_MalwareddancheveFax_Corporate_Email_Spam_Malware

    0 0

    By Dancho Danchev In March 2012, we intercepted an IRS themed malicious campaign that was serving client-side exploits to prospective users in an attempt to drop malware on the affected hosts. This week, we intercepted three consecutive campaigns using the exact same email template used in the March campaign. What has changed? Are the cybercriminals [...]

    ddanchevIRS_Email_Spam_Tax_Appeal_MalwareddanchevIRS_Email_Spam_Tax_Appeal_Malware

    0 0

    By Dancho Danchev Attempting to achieve a higher click-through rate for their exploits and malware serving malicious campaign, cybercriminals are currently spamvertising millions of emails attempting to trick users into thinking they’ve become part of a private conversation about missing EPLI policies. In reality, clicking on any of the links in the oddly formulated email [...]

    ddanchevMissing_EPLI_Policies_Email_Spam_Exploits_MalwareSHANIKA_Email_Spam_Exploits_MalwareddanchevMissing_EPLI_Policies_Email_Spam_Exploits_MalwareSHANIKA_Email_Spam_Exploits_Malware

    0 0

    By Dancho Danchev Cybercriminals are currently mass mailing millions of emails impersonating Microsoft Corporation in an attempt to trick users into clicking on a link in a bogus ‘License Order” confirmation email. Upon clicking on the link, users are exposed to the client-side exploits served by the latest version of the Black Hole Exploit Kit. [...]

    ddanchevMicrosoft_Windows_Email_Spam_Exploits_MalwareddanchevMicrosoft_Windows_Email_Spam_Exploits_Malware

    0 0

    By Dancho Danchev Cybercriminals have resumed spamvertising the Intuit Direct Deposit Service Informer themed malicious emails, which we intercepted and profiled earlier this month. While using an identical email template, the cybercriminals behind the campaign have introduced new client-side exploits serving domains, which ultimately lead to the latest version of the Black Hole Exploit Kit. [...]

    ddanchevIntuit_Direct_Deposit_Service_Email_Spam_Exploits_Malware_01ddanchevIntuit_Direct_Deposit_Service_Email_Spam_Exploits_Malware_01

    0 0

    By Dancho Danchev A currently ongoing spam campaign attempts to trick users into thinking that their ability to send Domestic Wire Transfers has been disabled. Impersonating the Federal Deposit Insurance Corporation (FDIC), the cybercriminals behind the campaign are potentially earning thousands of dollars in the process of monetizing the anticipated traffic. Once users click on [...]

    ddanchevFDIC_Email_Spam_Exploits_MalwareddanchevFDIC_Email_Spam_Exploits_Malware

    0 0

    By Dancho Danchev What would an attacker do if they were attempting to inject malicious iFrames on as many Web sites as possible? Would they rely on search engines’ reconnaissance as a foundation fo their efficient exploitation process, data mine a botnet’s infected population for accounting data related to CPanel, FTP and SSH accounts, purchase access to [...]

    ddanchevDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_NetworkDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_Network_OPSEC_FAILDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_Network_StatsDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_Network_iFrame_Traffic_BuyddanchevDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_NetworkDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_Network_OPSEC_FAILDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_Network_StatsDIY_Apache_Module_iFrames_Server_Scareware_Affiliate_Network_iFrame_Traffic_Buy

    0 0

    By Dancho Danchev Over the past few weeks, cybercriminals have been persistently spamvertising ‘Inter-company invoice’ themed emails, in an attempt to trick users into viewing the malicious .html attachment, or unpack and execute the malicious binary found in the attached archives. Upon clicking on the link, users are exposed to the client-side exploits served by [...]

    ddanchevInter_Company_Invoice_Email_Spam_Exploits_MalwareddanchevInter_Company_Invoice_Email_Spam_Exploits_Malware

    0 0

    By Dancho Danchev Facebook users, watch out! A recently launched malicious spam campaign is impersonating Facebook, Inc. in an attempt to trick its one billion users into thinking that they’ve received a notification alerting them on activities they may have missed on Facebook. Upon clicking on any of the links found in the email, users [...]

    ddanchevFacebook_Pending_Notifications_Email_Spam_Exploits_MalwareFacebook_Notifications_GraphFacebook_Notifications_Graph_02ddanchevFacebook_Pending_Notifications_Email_Spam_Exploits_MalwareFacebook_Notifications_GraphFacebook_Notifications_Graph_02

    0 0

    By Dancho Danchev U.K users, beware! Cybercriminals are currently mass mailing yet another malicious spam campaign, enticing users into viewing a bogus list of parking transactions. Upon executing the malicious attachment, the malware opens a backdoor on the affected host, allowing the cybercriminals behind the campaign complete access to the host. More details: Sample screenshot [...]

    ddanchevUK_Pay_By_Phone_Receipt_Email_Spam_MalwareddanchevUK_Pay_By_Phone_Receipt_Email_Spam_Malware

    0 0

    By Dancho Danchev From UPS, USPS to DHL, bogus and malicious parcel tracking confirmations are a common social engineering technique often used by cybercriminals to trick users into clicking on malicious links or executing malicious attachments found in the spamvertised emails. Continuing what appears to be a working social engineering tactic, cybercriminals are currently mass [...]

    ddanchevDHL_Express_Tracking_Notification_Email_Spam_MalwareddanchevDHL_Express_Tracking_Notification_Email_Spam_Malware

    0 0

    By Dancho Danchev Over the past couple of days, cybercriminals have launched yet another massive spam campaign, once again targeting U.K users. Time time, they are impersonating Vodafone U.K, in an attempt to trick its customers into executing a bogus MMS attachment found in the malicious emails. Upon execution, the sample opens a backdoor on [...]

    ddanchevVodafone_UK_Email_Spam_Malware_MMS_NotificationddanchevVodafone_UK_Email_Spam_Malware_MMS_Notification

    0 0

    By Dancho Danchev Cybercriminals are currently impersonating T-Mobile U.K, in an attempt to trick its customers into downloading a bogus billing information report. Upon execution, the malware opens a backdoor on the affected host, allowing the cybercriminals behind the campaign complete access to the infected PC. More details: Sample screenshot of the spamvertised email: Sample [...]

    ddanchevT-Mobile_UK_Email_Spam_Billing_MalwareddanchevT-Mobile_UK_Email_Spam_Billing_Malware

    0 0

    By Dancho Danchev Cybercriminals are mass mailing malicious emails about a meeting you wouldn’t want to attend – unless you want to compromise the integrity of your computer. Once executed, the malicious attachment opens a backdoor on the affected host, allowing the cybercriminals behind the campaign to gain complete access to the affected host. Naturally, [...]

    ddanchevBogus_Meeting_Reminder_Email_Spam_MalwareddanchevBogus_Meeting_Reminder_Email_Spam_Malware

    0 0

    By Dancho Danchev Sticking to their well proven practice of systematically rotating impersonated brands, the cybercriminals behind a huge majority of the malicious campaigns that we’ve been profiling recently are once again impersonating Intuit in an attempt to trick its customers into clicking on links exposing them to the client-side exploits served by the Black [...]

    ddanchevFake_Intuit_Software_Order_Confirmation_Email_Spam_Exploits_MalwareddanchevFake_Intuit_Software_Order_Confirmation_Email_Spam_Exploits_Malware

    0 0

    By Dancho Danchev Cybercriminals have recently launched yet another massive spam campaign attempting to trick users into clicking on malicious links or executing malicious attachments found in the spamvertised emails. More details: Sample screenshot of the spamvertised email: Sample detection rate for the malicious attachment: MD5: 8b194d05c7e7f96a37b1840388231791 – detected by 39 out of 44 antivirus scanners [...]

    ddanchevAugust_Invoices_Email_Spam_Malware_ExploitsInvoice_Email_Spam_Exploits_MalwareddanchevAugust_Invoices_Email_Spam_Malware_ExploitsInvoice_Email_Spam_Exploits_Malware

    0 0

    By Dancho Danchev Security researchers and security vendors are constantly profiling and blocking the malicious operations launched by organized crime groups on the Internet. In an attempt to increase the life cycle of their malicious campaigns, cybercriminals rely on a set of domains hosted on bulletproof servers. In addition to this tactic, they also rely on fast-fluxing, a technique [...]

    ddanchevMass_Domain_Registration_CybercrimeMass_Domain_Registration_Cybercrime_01Mass_Domain_Registration_Cybercrime_02Mass_Domain_Registration_Cybercrime_03Mass_Domain_Registration_Cybercrime_04ddanchevMass_Domain_Registration_CybercrimeMass_Domain_Registration_Cybercrime_01Mass_Domain_Registration_Cybercrime_02Mass_Domain_Registration_Cybercrime_03Mass_Domain_Registration_Cybercrime_04

    0 0

    By Dancho Danchev At the end of October, a cybercriminal or group of cybercriminals launched three massive spam campaigns in an attempt to trick users into clicking on a deceptive link and downloading a malicious attachment. Upon execution, the malware phones back to the command and control servers operated by the party that launched it, [...]

    ddanchevFedEx_Tracking_Number_Email_Spam__MalwareFedEx_Tracking_Number_Email_Spam__Malware_Second_Email_TemplateFedEx_Tracking_Number_Email_Spam__Malware_Third_Email_TemplateFedEx_Tracking_Number_Email_Spam__Malware__Compromised_ServerddanchevFedEx_Tracking_Number_Email_Spam__MalwareFedEx_Tracking_Number_Email_Spam__Malware_Second_Email_TemplateFedEx_Tracking_Number_Email_Spam__Malware_Third_Email_TemplateFedEx_Tracking_Number_Email_Spam__Malware__Compromised_Server

    0 0

    By Dancho Danchev Facebook users, watch what you click on! Cybercriminals are currently mass mailing bogus “Facebook Account Cancellation Requests“, in an attempt to trick Facebook’s users into clicking on the malicious link found in the email. Upon clicking on the link, users are exposed to client-side exploits which ultimately drop malware on the affected [...]

    ddanchevFake_Facebook_Account_Cancellation_Email_Spam_Exploits_MalwareddanchevFake_Facebook_Account_Cancellation_Email_Spam_Exploits_Malware

older | 1 | .... | 3 | 4 | (Page 5) | 6 | 7 | .... | 40 | newer