Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Blackmailer of Bitcoins Pleads Guilty of his Crime PDF Print E-mail
Written by Administrator   
Saturday, 20 September 2014 19:00 reported during first week of September 2014 that a 22 year old hacker, Lewys Martin, has pleaded guilty of blackmailing by threatening to disclose the personal details of thousands of phished Lloyds bank accounts holders, unless he was paid a ransom of 270,000 Pounds in bitcoins.

In May 2013, Martin contacted Lloyds Bank threatening to disclose the personal details of 28,000 Lloyds Bank account holders to The Sun newspaper and demanded one bitcoin for every ten accounts that he was having on a memory card.

At the time of his arrest, Martin was found to be possessing 3 malware-based phishing programs for stealing the personal details and compromised banking data. Besides, many indecent photos of children were also found that were not related to this investigation of blackmailing. reported during first week of September 2014 quoting Jason Tunn, Detective Chief Inspector of the Metropolitan Police Cyber Crime Unit, as saying "Martin could not break the bank's security systems but instead decided to target his phishing activity at retail customers. I would like to remind public to remain safe online and seek advice from for more security and safety."

Martin started committing computer related offences from the age of 20 in 2012. He was jailed for 18 months for spreading a Trojan Horse posing as a popular Call of Duty computer game, which logged keystrokes and stole banking details and passwords.

According to the local news reports, he faced charges again in November 2012 for launching DDoS attacks on websites of Oxford and Cambridge University, as well as on the website of local Kent police force that had gone offline for more than an hour. He finally pleaded guilty to DDoS charges in April 2013, and was jailed for another 2 years in May 2013 by which time he seemed to be doing his next crime for which he was due for another sentence in December. All in all it's a story of gradually increasing crime. Presently, Martin is in custody, and will return to court for the sentencing on 16th October, 2014.

Read more... - Blackmailer of Bitco...
Microsoft Found Zemot, a Strain of the Infamous Upatre Malware PDF Print E-mail
Written by Administrator   
Saturday, 20 September 2014 19:00 reported on 11th September, 2014 quoting Microsoft as saying "dropper of Zemot is a thread of the malware downloader, Upatre which benefits from different distribution points including both spam botnet as well as compromised websites."

Microsoft observed activity from TrojanDownloader: Win32/Upatre.B during late 2013 and found that cybercriminals preferred it to distribute two strains of click-fraud malicious software. These two strains have been accordingly named as PWS:Win32/Zbot.gen!AP and PWS:Zbot.CF), the software giant says.

In May 2014, Upatre.B was renamed as Zemot separate two threats which are similar in nature with certain different particulars which was enough to make them a new family of malware.

Zemot is a malware which is a part of a network having complex structure involving many kind of malware. Security researchers note that the malware is delivered to the PC of the user via exploit kits Nuclear Pack and Magnitude, or it can be circulated via spam-sending botnet as such as Kuluoz.

Once Zemot enters the system, it beings directing in click-fraud malware. However, Microsoft off-late observes many other types of threats which have been circulated (Rovnix, Viknok and Tesch) and can be used to download new malware or to steal sensitive information.

According to Microsoft, family of Zemot includes other important characteristics like using many techniques to ensure that the module which has been downloaded will be unbeaten on all Windows platform.

Besides this, Zemot has other features: major variants having different formats related to download file name and static configuration. Modules like getting the user privilege, OS version, routine downloading and URL parsing are picked from the source code of Zbot and variants can be tied up with other malwares (one Trojan downloader can circulate numerous malware payloads.)

This threat model is complex in nature which makes it important to ensure that your installed security software covers all part of infection chain consisting the downloaders which can otherwise create re-infection. The software giant also suggests that there are a whole lot of websites of software security available online which offer free versions of security tools which can be easily downloaded to remove Zemot from your machine.

Read more... - Microsoft Found Zemo...
Chinese Hacker Cabals Attempt Theft of Trade Secrets PDF Print E-mail
Written by Administrator   
Friday, 19 September 2014 09:00

According to FireEye the security company, a dual spying operation is going on by Chinese hackers who seek to steal trade secrets that countries in the neighborhood maintain.

Of these two hackers' cabals, one is called Moafee which spies on government and military, particularly, USA's defense sector, while the other is known as DragonOK which attacks manufacturing as well as high-tech organizations within Taiwan and Japan. Moreover, the groups operate from separate areas in China like DragonOK from Jiangsu Province and Moafee from Guandong Province both provinces in China.

FireEye's researchers state that the two groups distribute spear-phishing e-mails, with the messages well-crafted as well as sent to specific audience, while using the local language of the target Internauts. Attachments within the e-mails are like often zipped files alternatively password-protected MS files with executables embedded. It has also been seen that the spying cabals utilize decoy documents, which victims confront as the malware works behind the screen, according to the researchers. published this dated September 11, 2014.

A backdoor malware is also employed in the espionage campaigns. This ranges from PoisonIvy to NewCT2, CT/NewCT, Nflog and Mongall. Both groups further append the well-known proxy device HTRAN to their C&C infrastructures for disguising the places of their operations.

The researchers observe that the groups during their operations do one of the following: coordinate activities; acquire identical training; use an identical toolkit supply sequence; make certain mixture of the just stated. According to them, the campaigns appear like one "production line" assault sequence.

And while not articulating the sort of information spied on, FireEye does emphasize that the hacker groups focused on the area's "abundant natural resources" viz. natural gas and oil under the South China Sea.

FireEye's researchers also state that perhaps a yet another Chinese hacker cabal armed with 'advanced persistent threat' (APT) is utilizing a few of the identical methods and toolkits which DragonOK and Moafee are using. Through the coordination of joint assaults and sharing of TTPs, these APT criminals, according to the researchers, are capitalizing on the economic expertise in China for carrying out large-scale global espionage.

Read more... - Chinese Hacker Cabal...
Rev. Dyson Encounters Hacking of her E-mail PDF Print E-mail
Written by Administrator   
Friday, 19 September 2014 09:00

Rev. Beth Wheatley-Dyson belonging to Hanover, Massachusetts, USA situated St. Andrews Church expressed anguish when she learnt that her parishioners received unexpected e-mails from her account stating she was precariously stuck inside Turkey while facing dire trouble, reported, September 3, 2014.

The spurious e-mails stated that she required to be dispatched $2,600 immediately in order to enable her return to home, adding that her passport was being held pending the payment.

Actually, hackers had seized Dyson's e-mail A/C and used it to spam the fake messages to each and every address on her contact list.

The reverend said that the e-mail appeared really from her as it contained every bit of her information from the church.

It was the morning of 2nd September, 2014 when the problem began.

Rev. Dyson said that she received an e-mail from Yahoo which appeared as an official notification regarding certain appending done to her A/C.

However, she did not require any fresh account so she followed a given web-link with the intention towards disabling that account that nevertheless, resulted in the hack.

Soon, Dyson's brother rang up for telling that her e-mail was compromised. This was followed with her parishioners calling as also others like the Sheriff's office of Plymouth County (Massachusetts, USA).

The scam e-mail had such a form of writing that it could make Dyson's parishioners suspicious; however, there was also certain reference to St. Andrews' page on Facebook, in the e-mail, which also contained the church's website URL, as well as one telephone number of the nearby Hanover railway station.

Evidently, according to Dyson, she was concerned about the e-mail's mention of Turkey, since she journeyed to that country along with her husband 5-yrs back and her e-mail intruder possibly found references. Actually, says Dyson, she was in Alaska during the weekend following the Labor Day and not in Turkey.

Dyson further stated that she was trying getting her contacts to know she was ok; however, progress was sluggish as the hackers erased each and every of her e-mail contacts that left the reverend without knowing who were indeed the recipients of the scam e-mail.

Read more... - Rev. Dyson Encounter...
Hacker Dumps Around 5 Million Online Credentials of Google Account PDF Print E-mail
Written by Administrator   
Thursday, 18 September 2014 07:00 reported on 11th September, 2014 stating that a Russian hacker compromised near about 5 million accounts of Gmail and then published users' information in a text file on '', a well-known Russian Bitcoin Security board and leaked both usernames and their corresponding passwords.

Action Fraud, a help center run by London Police, which is a platform to register complaints regarding scams and online crime, notes that the hacking employed sending of bogus emails or phishing messages with links or some attachments by criminals.

These fraudulent emails persuade the recipient to click by convincing the recipient that they are from a genuine reliable source and some even employed recipient's personal details to reduce doubt on the mind of the recipient.

If the message contains a file as an attachment, then that it (that is, file) is probably tainted with malware which permits the attacker to infiltrate the hacker's device such as smartphone, computer or tablet. But if the link is clicked, the victim will be redirected to a bogus website where login or personal credentials may be asked.

However Google defended by saying that dumping of only small percentage of hacked combination of passwords and username would have allowed some hackers to access Gmail accounts.

The search giant (Google) confirmed that less than two percent of combos of email and passwords could actually be used for accessing Gmail accounts. published news on 11th September, 2014 quoting Google's spam and abuse team as saying that their automated anti-hijacking machines would have obstructed efforts of login and we have protected the affected accounts and requested those users to reset their passwords."

The company boasted about its strong security but users currently are not too convinced with these claims.

Meanwhile, Russian Internet forums recently dumped the large file of credentials which is the third one. Files containing the usernames and passwords for 4.7 million and 1.3 million Yandex accounts and two well known Russian Internet services were also recently leaked online. The news service stated that both companies have said that the files were common with obsolete, invalid and fake accounts.

Read more... - Hacker Dumps Around ...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1185
The Spamproblem is
Who's online
We have 22 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us