Blog Posts Tagged with "Malware-as-a-Service"

2dc39ef06d1ad53bea80d28b84f3aa7e

Cloud Coverage: Malware as a Service

July 04, 2012 Added by:Gregory Hale

The cloud-based control panel uses the secure HTTPS protocol and has a valid certificate. The customer has access to tutorials and a malware engine that generates customized Trojans in real-time. The team behind the service makes sure the created Trojans have a low rate of detection by major antivirus products...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

CapFire4: Criminal Malware-as-a-Service Platform

June 26, 2012 Added by:Plagiarist Paganini

Cybercrime is operating as an enterprise, with tools offered for the coordination of cyber attacks such as spamming of malware, malware hosting, and for building command and control infrastructure for botnets. The latest service is called CapFire4, and it’s a good example of malware-as-a-service...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On the New Generation of P2P Botnets

June 18, 2012 Added by:Plagiarist Paganini

"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executable from other bots -- every compromised computer is capable of providing data to the other bots..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

RedKit Private Exploit Tool Emerges in the Wild

May 04, 2012 Added by:Headlines

"RedKit is armed with two of the most popular exploits... The first exploit is a fairly obfuscated PDF file that exploits the LibTIFF vulnerability..." The second is the "latest Java exploit, dealing with the AtomicReferenceArray vulnerability..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Dirt Jumper DDoS Botnet Variants Continue to Proliferate

April 13, 2012 Added by:Headlines

“Development will continue, and there are increasing trends towards the development of attack techniques that will bypass certain types of anti-DDoS protection measures. The underground economy continues to flourish, and DDoS services are a piece of that rotten pie..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Implications of Malware-as-a-Service

January 25, 2012 Added by:Plagiarist Paganini

Criminal operations are managed as corporations and malware is designed as a service, with a maniacal attention paid to product quality. The life cycle is the most amazing aspect: From design, release, to after sales support - each stage is implemented with care and attention...

Comments  (0)