Dennis Fisher talks with Marc Maiffret of FireEye at RSA Conference 2010 about the lack of sophistication in the Aurora attack and the state of malware attacks on the Web.
Browsing Tag: malware
[img_assist|nid=3766|title=|desc=|link=none|align=right|width=100|height=100]The takedown of 100 servers used to control Zeus-related botnets may
be a short-lived victory, security researchers said after discovering
that about a third of the orphaned channels were able to regain
connectivity in less than 48 hours. The resurrection of at least 30 command and control channels came
after their ISP found a new upstream provider to
provide connectivity to the outside world, autonomous system records
showed. Read the full article. [The Register]
[img_assist|nid=3736|title=|desc=|link=none|align=left|width=100|height=100]By Stefan TanaseYesterday’s shut down of Troyak-as was definitely good news for the whole IT security community. Seeing cybercriminals getting kicked out from the Internet and then trying to get back inside calls for popcorn and soda.But unfortunately, as some botnets struggle, others stay unaffected: Koobface, for example, which uses compromised legitimate websites as proxies for their main command and control server.
[img_assist|nid=3703|title=|desc=|link=none|align=left|width=100|height=100]For the second time in less than six months, visitors to the Drudge
Report say they got malware in addition to the Web site’s usual
sensational headlines. Matt Drudge denied that his site was
infecting visitors, however it’s likely that the malware is coming from
ads delivered by a third-party ad network and not the site itself. Read the full article. [CNet]
[img_assist|nid=3673|title=|desc=|link=none|align=right|width=100|height=100]Security researchers have found the Mariposa bot client pre-installed on a mobile phone handset distributed in Europe, and say that the malware looks to have been installed on the phone’s memory card.
SAN FRANCISCO–Despite years of efforts by software security teams at major vendors to harden the operating systems and browsers that are the most common targets of attackers, exploitation of new as well as older vulnerabilities is still simpler than many people might think.
[img_assist|nid=3649|title=|desc=|link=none|align=left|width=100|height=100]The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a backdoor that allows unauthorized remote system access.
[img_assist|nid=3643|title=|desc=|link=none|align=right|width=100|height=100]Microsoft’s idea that the fight against malware could be funded by an Internet tax is “horrible,” an analyst said as other experts weighed in on a recent comment by the company’s security chief. Read the full article. [Computerworld]
Like the sequel to a successful movie, the botnet behind the distributed denial of service attacks that hit the country of Georgia during its conflict with Russia in 2008 has been updated. This time though, the idea isn’t hacktivism—it’s stealing financial data and, unlike in the case of other Russian botnets, the targets are the operators’ own countrymen. Read the full article. [eWEEK]
[img_assist|nid=3601|title=|desc=|link=none|align=left|width=100|height=100]Some of the malware families that were part of the Operation Aurora attacks that targeted dozens of major U.S. companies are being installed through fake antivirus and scareware attacks, researchers say.