The attackers behind the raft of banker Trojans emanating from Brazil these days are continuing to refine their craft and learn new tricks. Their latest efforts have seen them going to greater lengths than ever to obfuscate their creations and hide their true functionality in order to evade detection and analysis by security software.
Browsing Tag: malware
[img_assist|nid=4142|title=|desc=|link=none|align=right|width=100|height=100]Upscale grocery conglomerate Whole Foods Market said it is
continuing to clamp down on a series of Facebook-based scams that
entice users with a purported $500 gift card from the Austin,
Texas-based supermarket chain. Read the full article. [CNet]
[img_assist|nid=4138|title=|desc=|link=none|align=left|width=100|height=100]A new blended email threat appears to be a security alert from
eBay, said researchers. The email message with the subject line “eBay Procedural Warning
– Security Alert,” is addressed to “Dear eBay Member,” and warns
recipients that the sender has “detected security issues on behalf of
your account.” Read the full article. [Help Net Security]
[img_assist|nid=4125|title=|desc=|link=none|align=left|width=100|height=100]One year after the Conficker botnet was front-page news around the world, the U.S. Department of Homeland Security is preparing a report looking at the worldwide effort to keep it in check.The report, to be published within the month, shows how an ad hoc group of security researchers and Internet infrastructure providers banded together into an organization they called the Conficker Working Group. Its goal was to address what was at the time the world’s most serious cyberthreat. Read the full story [IDG News Service]
This video features a detailed demonstration of a technique for reproducing the Aurora Internet Explorer exploit using the Metasploit Framework.
[img_assist|nid=4098|title=|desc=|link=none|align=left|width=100|height=100]By Gunter Ollmann, DamballaLast night my attention was drawn to a couple of blog entries
relating to Google and the attacks they fell victim to earlier this
year. These attacks were eventually labeled as “Operation Aurora” by
McAfee (based upon the presence of the “aurora” keyword embedded within
some of the malware).
[img_assist|nid=4080|title=|desc=|link=none|align=left|width=100|height=100]The percentage of Internet users in China with no security software was 4.4% last year,a up from 3.9% the previous year, according to recent survey results by the China Internet Network Information Center (CNNIC) and China’s National Computer Network Emergency Response Technical Team (CNCERT). Read the full article. [Comptuerworld]
[img_assist|nid=4035|title=|desc=|link=none|align=right|width=100|height=100]Spammers and malware writers have wasted no time in taking advantage of Monday’s bombings in Moscow, opening up a campaign on Twitter to point users to malicious sites.
[img_assist|nid=4019|title=|desc=|link=none|align=right|width=87|height=100]Researchers are reporting on an ongoing targeted malware campaign using a FIFA World Cup 2010 theme, in an attempt to trick end users into executing a malicious PDF file, exploiting a recently patched flaw in Adobe Reader. Read the full article. [ZDNet]
Internet service providers have the ability to wipe nearly all malicious activity in their network without stepping on individual privacy and civil liberties, said Adam Rice, chief security officer at Mumbai-based Tata Communications. Read the full article. [TechTarget]