Cybercrime-friendly service offers access to tens of thousands of compromised...
By Dancho Danchev Among the first things a cybercriminal will (automatically) do, once they gain access to a compromised host, is to retrieve account/credential data. From compromised FTP credentials,...
View ArticleMadi/Mahdi/Flashback OS X connected malware spreading through Skype
By Dancho Danchev Over the past few days, we intercepted a malware campaign that spreads through Skype messages, exclusively coming from malware-infected friends or colleagues. Once users click on the...
View ArticleCybercriminals selling valid ‘business card’ data of company executives...
By Dancho Danchev Over the last couple of years, the industry’s and the media’s attention has been shifting from mass widespread malware campaigns to targeted attacks most commonly targeting human...
View ArticleA peek inside the ‘Zerokit/0kit/ring0 bundle’ bootkit
By Dancho Danchev In a diversified underground marketplace, where multiple market players interact with one another on a daily basis, there are the “me too” developers, and the true “innovators” whose...
View ArticleDIY Skype ring flooder offered for sale
By Dancho Danchev Thanks to the ease of generating a botnet, in 2013, stolen accounting data on a mass scale is a no longer a hot underground item, it’s a commodity, one that’s being offered by...
View ArticleSpamvertised ‘Your order for helicopter for the weekend’ themed emails lead...
By Dancho Danchev Cybercriminals are currently mass mailing tens of thousands of emails, in an attempt to trick users into thinking that the order for their “air transportation services has been...
View ArticleA peek inside a ‘life cycle aware’ underground market ad for a private keylogger
By Dancho Danchev What’s greed to some cybercriminals, is profit maximization to others, especially in times when we’re witnessing the maturing state of the modern cybercrime ’enterprise’. Many enter...
View ArticleBitCoin Jackers Ask: “What’s in Your Wallet?”
By Adam McNeil With all the recent media coverage and extreme changes of the BitCoin value, it should come as no surprise that malware authors are trying to capitalize on the trends. These people...
View ArticleAmerican Airlines ‘You can download your ticket’ themed emails lead to malware
By Dancho Danchev Cybercriminals are currently spamvertising tens of thousands of emails impersonating American Airlines in an attempt to trick its customers into thinking that they’ve received a...
View ArticleCybercriminals offer spam-friendly SMTP servers for rent
By Dancho Danchev In times when modern cybercriminals take advantage of the built-in SMTP engines in their malware platforms, as well as efficient and systematic abuse of Web-based email service...
View ArticleHow mobile spammers verify the validity of harvested phone numbers – part two
By Dancho Danchev Just as we anticipated earlier this year in our “How mobile spammers verify the validity of harvested phone number” post, mobile spammers and cybercriminals in general will continue...
View ArticleA peek inside a (cracked) commercially available RAT (Remote Access Tool)
By Dancho Danchev In an attempt to add an additional layer of legitimacy to their malicious software, cybercriminals sometimes simply reposition them as Remote Access Tools, also known as R.A.Ts. What...
View ArticleDIY Russian mobile number harvesting tool spotted in the wild
By Dancho Danchev Earlier this year we profiled a newly released mobile/phone number harvesting application, a common tool in the arsenal of mobile spammers, as well as vendors of mobile spam services....
View ArticleDIY SIP-based TDoS tool/number validity checker offered for sale
By Dancho Danchev Over the past year, we observed an increase in publicly available managed TDoS (Telephony Denial of Service) services. We attribute this increase to the achieved ‘malicious economies...
View ArticleCAPTCHA-solving Russian email account registration tool helps facilitate...
By Dancho Danchev Just how challenged are cybercriminals when they’re being exposed to CAPTCHAs in 2013? Not even bothering to “solve the problem” by themselves anymore, thanks to the cost-efficient,...
View ArticleHistorical OSINT – The ‘Boston Marathon explosion’ and ‘Fertilizer plant...
By Dancho Danchev Following the recent events, opportunistic cybercriminals have been spamvertising tens of thousands of malicious emails in an attempt to capitalize on on the latest breaking news....
View ArticleFake ‘DHL Delivery Report’ themed emails lead to malware
By Dancho Danchev Over the past couple of days, cybercriminals have launched two consecutive malware campaigns impersonating DHL in an attempt to trick users into thinking that they’ve received a...
View ArticleCybercriminals impersonate Bank of America (BofA), serve malware
By Dancho Danchev Relying on tens of thousands of fake “Your transaction is completed” emails, cybercriminals have just launched yet another malicious spam campaign attempting to socially engineer Bank...
View ArticleHow fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their...
By Dancho Danchev How are cybercriminals most commonly abusing legitimate Web traffic? On the majority of occasions, some will either directly embed malicious iFrames on as many legitimate Web sites as...
View ArticleManaged ‘Russian ransomware’ as a service spotted in the wild
By Dancho Danchev In 2013, you no longer need to posses sophisticated programming skills to manage a ransomware botnet, potentially tricking tens of thousands of gullible users, per day, into...
View Article