Browsing Category: Malware

Worms and Scareware Attacks on the Rise

Categories: Malware

Microsoft today released its biannual Security Intelligence Report
which demonstrates some surprising conclusions about how the threat
landscape is impacting enterprise networks. For example, the number of
rogue security software infections[img_assist|nid=1407|title=|desc=|link=none|align=left|width=115|height=91], which experienced a high-profile
scourge earlier this year, was down, as was the number of Trojan and
downloader infections. Computer worm infections, on the other hand,
surged upward. Read the full story [SearchSecurity.com].

Read more...

On Social Networking Attacks, Gumblar and Cyberterror

[img_assist|nid=889|title=|desc=|link=none|align=right|width=115|height=115]Dennis Fisher and Ryan Naraine discuss the increasing volume
and sophistication of attacks on social networks, the continued rise of malware
campaigns such as Gumblar and the recent news around cyberwar and cyberterror.

Read more...

Gumblar Attacks Spread to Thousands of New Sites

Categories: Malware

Gumblar, the nasty bit of malware that was part of a mas[img_assist|nid=1295|title=|desc=|link=none|align=right|width=115|height=115]s SQL injection on legitimate Web sites this spring, is continuing to spread and its creators have been busy lately, compromising hundreds of new sites, leading to a massive new wave of infections of end-user PCs.

Read more...

Inside The Opachki Link Hijacker Trojan

Categories: Malware

Opachki is one of many software tools developed by criminals to hijack and monetize Windows users’ search traffic using affilate-based search engines that are ultimately advertiser-sponsored, sometimes by well-known and respected firms. Instead of only hijacking search result links, Opachki attempts to hijack as many links as it can on any web page, using the text enclosed by the HTML HREF tag as a faux search phrase when redirecting the user to an affiliate-based search engine.  Read the technical analysis [Joe Stewart/SecureWorks]

Read more...

Facebook Wins $711 Million in Spam Case

Categories: Malware

Social networking website Facebook was awarded $711.2 million in
damages relating to an anti-spam case against Internet marketer Sanford
Wallace, court documents show.

[img_assist|nid=1291|title=|desc=|link=none|align=left|width=115|height=115]The site filed an anti-spamming case against Wallace in February for
accessing people’s Facebook accounts without their permission and
sending phony mail and posts to the individuals’ public message wall,
the company said in a blog post.  Read the full story [Reuters]

Read more...

Malware Abundant in Twitter URLs

Categories: Malware

As many as one in every 500 web addresses posted on Twitter lead to
sites hosting malware, according to researchers at Kaspersky Labs who
have deployed a tool that examines URLs circulating in tweets.[img_assist|nid=1280|title=|desc=|link=none|align=right|width=135|height=135]
The spread of malware is aided by the popular use of shortened URLs
on Twitter, which generally hide the real website address from users
before they click on a link, preventing them from self-filtering links
that appear to be dodgy.  Read the full story [Wired/Kim Zetter] Also see this report [CNet/Elinor Mills]

Read more...

Unstoppable New Phishing Attacks Blanket Facebook, Twitter, Hotmail

Categories: Malware

How
quaint seem the days when naïve hacker wannabes phished PayPal logons,
then posted them on IRC chat channels, to try to make a few bucks — but
mostly for bragging rights. That was circa 2002-2003.[img_assist|nid=1218|title=|desc=|link=none|align=left|width=100|height=100]
Fast forward to the present. At this moment, Facebook is being blanketed by two high-volume email phishing campaigns.  Read the full story [Byron Acohido/Last Watchdog]

Read more...

The Evolution of Rogue Anti-Virus

Categories: Malware

[img_assist|nid=1214|title=|desc=|link=none|align=left|width=115|height=115]Guest post by Dmitry BestuzhevWe often write about the fact that cybercriminals constantly change their tactics to take account of developments in the security and software industries. And I just came across a great example of this: it shows how the people behind rogue antivirus solutions adapt their “products” to exploit developments and changes in genuine anti-virus solutions.

Read more...

Twitter Warns About New Phishing Attack

Categories: Malware

Twitter warned on Wednesday about a new phishing attack[img_assist|nid=1215|title=|desc=|link=none|align=right|width=115|height=115] in which direct
messages to users link to a fake log-in page that steals passwords.
“We’ve seen a few phishing attempts today; if you’ve received a strange
(direct message), and it takes you to a Twitter log-in page, don’t do
it!” the Twitter spam warning says. Read the full story [CNet/Elinor Mills]

Read more...

Internet Phone Systems Become Fraudster’s Tool

Categories: Malware

Cybercriminals have found a new launching pad for their scams: the phone systems of small and medium-sized businesses across the U.S.

In recent weeks, they have hacked into dozens of telephone systems across the country, using them as a way to contact unsuspecting bank customers and trick them into divulging their bank account numbers and passwords.  Read the full story [IDG News Service/Robert McMillan]

Read more...