Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


Channel Description:

Internet security threat updates and insights.

older | 1 | .... | 7 | 8 | (Page 9) | 10 | 11 | .... | 40 | newer

    0 0

    By Dancho Danchev What is the Russian underground up to when it comes to ‘spear phishing’ attacks? How prevalent is the tactic among Russian cybercriminals? What “data acquisition tactics” do they rely on, and just how sophisticated are their “data mining” capabilities? Let’s find out by emphasizing on a recent underground market advertisement offering access [...]

    ddanchevRussian_Spam_Leads_Segmented_HarvestedRussian_Spam_Leads_Segmented_Harvested_01Russian_Spam_Leads_Segmented_Harvested_02ddanchevRussian_Spam_Leads_Segmented_HarvestedRussian_Spam_Leads_Segmented_Harvested_01Russian_Spam_Leads_Segmented_Harvested_02

    0 0

    By Dancho Danchev What would an average cybercriminal do if he had access to tens of thousands of compromised email accounts? He’d probably start outsourcing the CAPTCHA solving process, in an attempt to hijack the IP reputation of both Domain Keys verified and trusted domains of all major free Web based email service providers. What about sophisticated attackers [...]

    ddanchevDIY_Hacked_Email_Content_Grabbing_Script_Espionage_OSINT_BotnetsDIY_Hacked_Email_Content_Grabbing_Script_Espionage_OSINT_Botnets_01DIY_Hacked_Email_Content_Grabbing_Script_Espionage_OSINT_Botnets_02ddanchevDIY_Hacked_Email_Content_Grabbing_Script_Espionage_OSINT_BotnetsDIY_Hacked_Email_Content_Grabbing_Script_Espionage_OSINT_Botnets_01DIY_Hacked_Email_Content_Grabbing_Script_Espionage_OSINT_Botnets_02

    0 0

    By Dancho Danchev Just as we anticipated on numerous occassions in our series of blog posts exploring the emerging DIY (do it yourself) trend within the cybercrime ecosystem, novice cybercriminals continue attempting to steal market share from market leaders, in order for them to either gain credibility within a particular cybercrime-friendly community, or secure a revenue stream. Throughout 2012, [...]

    ddanchevDIY_Java_Unsigned_Malicious_Applet_Generator_MalwareDIY_Java_Unsigned_Malicious_Applet_Generator_Malware_01ddanchevDIY_Java_Unsigned_Malicious_Applet_Generator_MalwareDIY_Java_Unsigned_Malicious_Applet_Generator_Malware_01

    0 0

    By Dancho Danchev Despite the fact that the one-to-many type of malicious campaign continues dominating the threat landscape, cybercriminals are constantly looking for new ways to better tailor their campaigns to the needs, wants, and demands of potential customers. Utilizing basic marketing concepts such as localization, market segmentation, as well as personalization, today’s sophisticated cybercriminals would [...]

    ddanchevDIY_Steam_Use_Information_Harvester_Mass_Group_InviterDIY_Steam_Use_Information_Harvester_Mass_Group_Inviter_01ddanchevDIY_Steam_Use_Information_Harvester_Mass_Group_InviterDIY_Steam_Use_Information_Harvester_Mass_Group_Inviter_01

    0 0

    By Dancho Danchev Over the past 24 hours, we intercepted tens of thousands of malicious emails attempting to socially engineering BofA’s CashPro users into downloading and executing a bogus online digital certificate attached to the fake emails. More details: Sample screenshot of  the spamvertised email: Detection rate for the malicious executable: MD5: bfe7c4846823174cbcbb10de9daf426b – detected by 34 out of [...]

    ddanchevEmail_Spam_Malware_CashPro_Social_EngineeringddanchevEmail_Spam_Malware_CashPro_Social_Engineering

    0 0

    By Dancho Danchev Over the past week, a cybercriminal/gang of cybercriminals whose activities we’ve been actively profiling over a significant period of time, launched two separate massive spam campaigns, this time impersonating the Better Business Bureau (BBB), in an attempt to trick users into thinking that their BBB accreditation has been terminated. Once users click on any [...]

    ddanchevBBB_Better_Business_Bureau_Email_Spam_Exploits_Malware_Black_Hole_Exploit_KitBBB_Better_Business_Bureau_Email_Spam_Exploits_Malware_Black_Hole_Exploit_Kit_01ddanchevBBB_Better_Business_Bureau_Email_Spam_Exploits_Malware_Black_Hole_Exploit_KitBBB_Better_Business_Bureau_Email_Spam_Exploits_Malware_Black_Hole_Exploit_Kit_01

    0 0

    By Dancho Danchev We have recently spotted a new underground market ad, featuring a new commercially available malware bot+rootkit based on the ZeuS crimeware’s leaked source code. According to its author, the modular nature of the bot, allows him to keep coming up with new plugins, resulting in systematic “innovation” and the introduction of new features. What’s the long-term [...]

    ddanchevZeuS_Source_Code_Rootkit_2013ZeuS_Source_Code_Rootkit_2013_01ZeuS_Source_Code_Rootkit_2013_02ZeuS_Source_Code_Rootkit_2013_03ZeuS_Source_Code_Rootkit_2013_04ZeuS_Source_Code_Rootkit_2013_05ZeuS_Source_Code_Rootkit_2013_06ZeuS_Source_Code_Rootkit_2013_07ZeuS_Source_Code_Rootkit_2013_08ddanchevZeuS_Source_Code_Rootkit_2013ZeuS_Source_Code_Rootkit_2013_01ZeuS_Source_Code_Rootkit_2013_02ZeuS_Source_Code_Rootkit_2013_03ZeuS_Source_Code_Rootkit_2013_04ZeuS_Source_Code_Rootkit_2013_05ZeuS_Source_Code_Rootkit_2013_06ZeuS_Source_Code_Rootkit_2013_07ZeuS_Source_Code_Rootkit_2013_08

    0 0

    By Dancho Danchev Over the last couple of days, a cybercricriminal/gang of cybercriminals that we’ve been extensively profiling, resumed spamvertising tens of thousands of emails, in an attempt to trick users that they have a pending wire transfer. Once users click on any of the links found in the malicious emails, they’re exposed to the [...]

    ddanchevEmail_Spam_Exploits_Malware_Black_Hole_Exploit_Kit_Wire_TransferddanchevEmail_Spam_Exploits_Malware_Black_Hole_Exploit_Kit_Wire_Transfer

    0 0

    By Dancho Danchev A currently ongoing malicious email campaign is impersonating ADP in an attempt to trick its customers into thinking that they’ve received a ‘Package Delivery Notification.’ In reality though, once a user clicks on any of the links found in the malicious email, they’re automatically exposed to the client-side exploits served by the Black Hole [...]

    ddanchevADP_Package_Delivery_Notification_Email_Spam_Exploits_Malware_Black_Hole_Exploit_KitddanchevADP_Package_Delivery_Notification_Email_Spam_Exploits_Malware_Black_Hole_Exploit_Kit

    0 0

    By Dancho Danchev Utilizing basic site ‘stickiness’ and visitor retention practices, over the years, cybercrime-friendly communities have been vigorously competing to attract, satisfy, and retain their visitors. From exclusive services available only to community members, to DIY cybercrime-friendly tools, the practice is still a common way for the community administrators to boost the underground reputation of their forum. However, [...]

    ddanchevCybercrime_Community_Branded_HTTP_SMTP_KeyloggerCybercrime_Community_Branded_HTTP_SMTP_Keylogger_01Cybercrime_Community_Branded_HTTP_SMTP_Keylogger_02Cybercrime_Community_Branded_HTTP_SMTP_Keylogger_03ddanchevCybercrime_Community_Branded_HTTP_SMTP_KeyloggerCybercrime_Community_Branded_HTTP_SMTP_Keylogger_01Cybercrime_Community_Branded_HTTP_SMTP_Keylogger_02Cybercrime_Community_Branded_HTTP_SMTP_Keylogger_03

    0 0

    By Dancho Danchev On the majority of occasions, cybercriminals will take basic OPSEC (Operational Security) precautions when using the Internet, in an attempt to make it harder for law enforcement to keep track of their fraudulent activities. Over the years, these techniques have greatly evolved to include hybrid online anonymity solutions offered exclusively to cybercriminals internationally. In this [...]

    ddanchevMalware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_CybercrimeMalware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_02Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_01Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_03Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_04Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_05ddanchevMalware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_CybercrimeMalware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_02Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_01Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_03Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_04Malware_Infected_Host_Stepping_Stone_Socks_Server_Anonymity_Cybercrime_05

    0 0

    By Dancho Danchev Cybercriminals are currently mass mailing tens of thousands malicious ‘CNN Breaking News’ themed emails, in an attempt to trick users into clicking on the exploit-serving and malware-dropping links found within. Once users click on any of the links found in the bogus emails, they’re automatically exposed to the client-side exploits served by the [...]

    ddanchevFake_Email_Spam_CNN_Breaking_News_Alerts_Exploits_Malware_Social_Engineering_Black_Hole_Exploit_KitFake_Email_Spam_CNN_Breaking_News_Alerts_Exploits_Malware_Social_Engineering_Black_Hole_Exploit_Kit_01Fake_Email_Spam_CNN_Breaking_News_Alerts_Exploits_Malware_Social_Engineering_Black_Hole_Exploit_Kit_02ddanchevFake_Email_Spam_CNN_Breaking_News_Alerts_Exploits_Malware_Social_Engineering_Black_Hole_Exploit_KitFake_Email_Spam_CNN_Breaking_News_Alerts_Exploits_Malware_Social_Engineering_Black_Hole_Exploit_Kit_01Fake_Email_Spam_CNN_Breaking_News_Alerts_Exploits_Malware_Social_Engineering_Black_Hole_Exploit_Kit_02

    0 0

    By Dancho Danchev Risk-forwarding is an inseparable part of the cybercrime ecosystem. Whether it’s the use of malware-infected hosts as stepping-stones, the issuing of License Agreements for your latest rootkit release stating that it’s meant to be tested against the customer’s own systems — you wish — or the selling of cheap access to verified PayPal accounts, [...]

    ddanchevMoney_Mule_Management_ScriptddanchevMoney_Mule_Management_Script

    0 0

    By Dancho Danchev Cybercriminals are currently spamvertising tens of thousands of malicious emails impersonating BBC News, in an attempt to trick users into thinking that someone has shared a Cyprus bailout themed news item with them. Once users click on any of the links found in the fake emails, they’re automatically exposed to the client-side [...]

    ddanchevFake_Malicious_BBC_News_Email_Malware_Exploits_Spam_Black_Hole_Exploit_Kit_CyprusddanchevFake_Malicious_BBC_News_Email_Malware_Exploits_Spam_Black_Hole_Exploit_Kit_Cyprus

    0 0

    By Dancho Danchev Over the past week, we intercepted a massive ‘ADP Payroll Invoice” themed malicious spam campaign, enticing users into executing a malicious file attachment. Once users execute the sample, it downloads additional pieces of malware on the affected host, compromising the integrity, and violating the confidentiality of the affected PC. More details: Sample [...]

    ddanchevEmail_Spam_ADP_Payroll_Invoice_Malware_Social_Engineering_Malicious_Software_Downloader_BotnetddanchevEmail_Spam_ADP_Payroll_Invoice_Malware_Social_Engineering_Malicious_Software_Downloader_Botnet

    0 0

    By Dancho Danchev A couple of days ago our sensors picked up two separate malicious email campaigns, both impersonating Data Processing Services, that upon successful client-side exploitation (courtesy of the Black Hole Exploit Kit), drops an identical piece of malicious software. Let’s dissect the campaigns, expose the malicious domains portfolio, connect them to previously profiled malicious campaigns, and [...]

    ddanchevACH_File_ID_Email_Spam_Malware_Exploits_Social_Engineering_Black_Hole_Exploit_KitTerminated_Wire_Transfer_Notification_Data_Processing_Service_Email_Spam_Malware_Exploits_Black_Hole_Exploit_KitddanchevACH_File_ID_Email_Spam_Malware_Exploits_Social_Engineering_Black_Hole_Exploit_KitTerminated_Wire_Transfer_Notification_Data_Processing_Service_Email_Spam_Malware_Exploits_Black_Hole_Exploit_Kit

    0 0

    By Dancho Danchev In times when we’re witnessing the most prolific and systematic abuse of the Internet for fraudulent and purely malicious activities, there are still people who cannot fully grasp the essence of the cybercrime ecosystem in the context of the big picture — economic terrosm — and in fact often deny its existence, [...]

    ddanchevDIY_Botnet_Command_And_ControlDIY_Botnet_Command_And_Control_01ddanchevDIY_Botnet_Command_And_ControlDIY_Botnet_Command_And_Control_01

    0 0

    By Dancho Danchev On a daily basis we process multiple malicious campaigns that, in 95%+ of cases, rely on the market leading Black Hole Exploit Kit. The fact that this Web malware exploitation kit is the kit of choice for the majority of cybercriminals, speaks for its key differentiation factors/infection rate success compared to the competing exploit [...]

    ddanchevegypack8egypack8_01egypack1egypack2egypack3egypack4egypack5egypack6egypack7egypack9ddanchevegypack8egypack8_01egypack1egypack2egypack3egypack4egypack5egypack6egypack7egypack9

    0 0

    By Dancho Danchev While the authors/support teams of some of the market leading Web malware exploitation kits are competing on their way to be the first kit to introduce a new exploit on a mass scale, others, largely influenced by the re-emergence of the DIY (do-it-yourself) trend across the cybercrime ecosystem, continue relying on good [...]

    ddanchevDIY_Java_Based_RAT_Trojan_BotnetddanchevDIY_Java_Based_RAT_Trojan_Botnet

    0 0

    By Dancho Danchev We have recently intercepted a malicious spam campaign, that’s attempting to trick users into thinking that they’ve received a non-existent “changelog.” Once gullible and socially engineered users execute the malicious attachment, their PCs automatically become part of the botnet operated by the cybercriminal/gang of cybercriminals. More details: Sample screenshot of the spamvertised [...]

    ddanchevEmail_Spam_Malware_Malicious_Software_Social_Engineering_ChangelogddanchevEmail_Spam_Malware_Malicious_Software_Social_Engineering_Changelog

older | 1 | .... | 7 | 8 | (Page 9) | 10 | 11 | .... | 40 | newer