Legitimate software apps impersonated in a blackhat SEO-friendly PUA...
Deceptive vendors of PUAs (Potentially Unwanted Applications) continue relying on a multitude of traffic acquisition tactics, which in combination with the ubiquitous for the market segment ‘visual...
View ArticleEvolution of Encrypting Ransomware
Recently we’ve seen a big change in the encrypting ransomware family and we’re going to shed light on some of the newest variants and the stages of evolution that have led the high profile malware to...
View ArticleDIY cybercrime-friendly (legitimate) APK injecting/decompiling app spotted in...
With millions of Android users continuing to acquire new apps through Google Play, cybercriminals continue looking for efficient and profitable ways to infiltrate Android’s marketplace using a variety...
View ArticleAndroid.Koler – Android based ransomware
Recently, a new Android threat named Android.Koler has begun popping up in the news. According to an article by ARS Technica, it reacts similar to other pieces of ransomware often found on Windows...
View ArticleMalicious DIY Java applet distribution platforms going mainstream – part two
In a cybercrime ecosystem, dominated by client-side exploits serving Web malware exploitation kits, cybercriminals continue relying on good old fashioned social engineering tricks in an attempt to...
View ArticleSymantec’s “AV is Dead” Is Not News
On Monday, an executive at Symantec declared “AV is dead.” He went on to repeat to several media outlets that protecting customers on their PC and Mac computers had become an impossible battle that...
View ArticleSpamvertised ‘Error in calculation of your tax’ themed emails lead to malware
Cybercriminals continue populating their botnets through the persistent spamvertising of tens of thousands of legitimately looking malicious emails, impersonating popular brands, in an attempt to trick...
View ArticleAV Isn’t Dead. It’s Evolving.
Since the WSJ report was released, endpoint security solutions have received a lot of media attention. As many have started to ask “Is AV really dead?”, I felt it was a good idea to talk about it from...
View ArticleA peek inside a subscription-based DIY keylogging based type of...
Cybercriminals continuing to systematically release DIY (do-it-yourself) cybercrime-friendly offerings in an effort to achieve a ‘malicious economies of scale’ type of fraudulent model which is a...
View ArticleSpamvertised ‘Notification of payment received’ themed emails lead to malware
PayPal users, watch what you click on! We’ve recently intercepted a currently circulating malicious spamvertised campaign which is impersonating PayPal in an attempt to trick socially engineered end...
View ArticleMalicious JJ Black Consultancy ‘Computer Support Services’ themed emails lead...
Relying on the systematic and persistent spamvertising of tens of thousands of fake emails, as well as the impersonation of popular brands for the purpose of socially engineering gullible users into...
View ArticleA peek inside a newly launched all-in-one E-shop for cybercrime-friendly...
Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious ‘know-how’, further contributing to the growth of the...
View ArticleLong run compromised accounting data based type of managed iframe-ing service...
In a cybercrime ecosystem dominated by DIY (do-it-yourself) malware/botnet generating releases, populating multiple market segments on a systematic basis, cybercriminals continue seeking new ways to...
View ArticleWebroot returns from Automation Nation 2014
Webroot, the market leader in cloud-based, real-time Internet threat detection, recently returned from the fifth annual Automation Nation in Orlando, hosted by LabTech Software. Labtech, a robust...
View ArticleMalicious Web-based Java applet generating tool spotted in the wild
Despite the prevalence of Web based client-side exploitation tools as the cybercrime ecosystem’s primary infection vector, in a series of blog posts, we’ve been emphasizing on the emergence of...
View ArticleSpamvertised ‘June invoice” themed emails lead to malware
Cybercriminals continue spamvertising tens of thousands of malicious emails on their way to socially engineer gullible end users, ultimately increasing their botnet’s infected population through the...
View ArticleSuccessful Launch of Webroot for Gamer at E3
Webroot, the market leader in cloud-based, real-time Internet threat detection, recently returned from the 18th annual Electronic Entertainment Expo, or E3 for short, hosted by the Entertainment...
View ArticleSpamvertised ‘Customer Daily Statement’ themed emails lead to malware
Cybercriminals continue to efficiently populate their botnets, through the systematic and persistent spamvertising of tens of thousands of fake emails, for the purpose of socially engineering gullible...
View ArticleA peek inside a commercially available Android-based botnet for hire
Relying on the systematic release of DIY (do-it-yourself) mobile malware generating tools, commercial availability of mobile malware releases intersecting with the efficient exploitation of legitimate...
View ArticleA peek inside the online romance scam.
Online dating can be rough, and no matter how many safeguards are in place in the multiple legitimate dating websites out there, the scammers are getting around the blocks and still luring in potential...
View Article