Blog Posts Tagged with "trojan"

69dafe8b58066478aea48f3d0f384820

Microsoft and Law Enforcement Hit Zeus Botnet Servers

March 26, 2012 Added by:Headlines

"With this legal and technical action, a number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Identifies New Duqu Trojan Driver Variant

March 20, 2012 Added by:Headlines

Symantec reports the discovery of a previously unseen driver (mcd9×86.sys) for Duqu that was apparently compiled as recently as February of this year, giving reason to believe the malware is very much alive and kicking...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The FBI Can Haz Lulz Too...

March 15, 2012 Added by:Kevin McAleavey

Since Sabu's arrest a number of spurious lulz cannon tools have been interspersed in tweets, including the infamous LOIC, others containing added "call home" code, and some virused booty culminating in the latest release of "Anonymous OS" which is wrapped in trojans...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

DNSChanger: FBI’s Internet Blackout Postponed

March 06, 2012 Added by:Pierluigi Paganini

For several months, news was circulating about the planned blackout of the Internet for potentially millions of users on March 8. Last week a federal judge postponed that order for 120 days to give businesses and governments more time to mitigate the DNSChanger threat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sophisticated New Zeus Variants Continue to Propagate

February 24, 2012 Added by:Headlines

"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executables from other bots - every compromised computer is capable of providing data to the other bots..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Identifies Polymorphic Android App Malware

February 06, 2012 Added by:Headlines

Researchers at Symantec have identified a crafty Trojan targeting Android devices which slightly modifies its code every time the malware is downloaded, a called server-side polymorphism, which makes it more difficult to detect by signature-based antivirus software defenses...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New Drive-By Malware Spam Infects Upon Opening Email

February 01, 2012 Added by:Pierluigi Paganini

According the announcement from researchers at Eleven, a German security firm, it is sufficient that a communication is merely opened in the email client to infect the target without the user clicking on a link or opening an attachment...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Evidence of Chinese Attacks on US Defense Contractors

January 30, 2012 Added by:Pierluigi Paganini

At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Implications of Malware-as-a-Service

January 25, 2012 Added by:Pierluigi Paganini

Criminal operations are managed as corporations and malware is designed as a service, with a maniacal attention paid to product quality. The life cycle is the most amazing aspect: From design, release, to after sales support - each stage is implemented with care and attention...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

FBI Warns: GameOver

January 10, 2012 Added by:Kevin McAleavey

The significant part of the DDOS angle with the GameOver Zeus Trojan attack is that it serves as a diversion while the looting continues, and prevents access to mitigation with the bank until it's too late. That's what motivated the FBI to put out this alert...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Anatomy of a Nitro Cyber Attack

December 13, 2011 Added by:Headlines

"They are sending targets a password-protected archive... which contains a malicious executable. The executable is a variant of Poison IVY and the email topic is some form of upgrade to popular software, or a security update. The most recent email brazenly claims to be from Symantec..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Duqu May Actually Be An Advanced Cyber Weapon

November 17, 2011 Added by:Headlines

“Why go to all this trouble to deploy a simple key-logger? Given that there are additional drivers waiting to be discovered, we can liken Duqu to a sophisticated rocket launcher – we have yet to see the real ammunition appear..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Analysis: Duqu Trojan is Not on Par with Stuxnet

October 31, 2011 Added by:Headlines

"Both Duqu and Stuxnet are highly complex programs with multiple components. All of the similarities from a software point of view are in the "injection" component implemented by the kernel driver. The ultimate payloads of Duqu and Stuxnet are significantly different and unrelated..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Chinese Security Firm Discovers BIOS Based Virus

September 19, 2011 Added by:Dan Dieterle

When a system is infected, the trojan checks to see if the system has an Award Bios. If it does, it hooks itself to the BIOS. Once the system is restarted, it adds itself to the hard drive’s master boot record (MBR). Next it infects the winlogon.exe or winnt.exe system files...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New SpyEye Variant Targeting Android Devices

September 15, 2011 Added by:Headlines

The new variant is designed to harvest text messages that contain a one-time use code sent to customers by institutions as an added security measure for clients engaged in mobile banking transactions, making SpyEye an even more powerful tool for stealing financial login credentials...

Comments  (0)

Page « < 1 - 2 - 3 > »