Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Attempted Hack Noticed Against NYT PDF Print E-mail
Written by Administrator   
Monday, 29 August 2016 07:00


According to a report from the New York Times on August 22, its office in Moscow recently encountered a potential cyber-assault during the early days of August 2016. When requested to give its comments, NYT didn't instantly respond, but stated that there wasn't any clue to show that hackers were able to get through the newspaper's security systems. Cnet.com posted this, August 23, 2016.

US authorities, who intimated the news to CNN, stated that according to investigators, state-sponsored Russian hackers were responsible for the assault. The authorities comment that the attempted attack maybe those same hackers' job which infiltrated the DCCC and DNC of America's Democratic Party when the country's presidential election canvassing was going on.

It was during past few months when specialists noticed the intrusions while were clueless as to what reason played behind the hackers' work of attacking news outlets. It maybe mentioned that journalists regularly exchange discussions and conduct interviews with any number of officials within the Government-of-United States.

ABC News couldn't figure out the other news agencies besides the NYT that were attacked. The news channel to first broadcast about the hacks along with subsequent investigations was CNN.

Spokeswoman Eileen Murphy for NYT said that the newspaper was constantly keeping watch over its systems using tools and intelligence that were the latest. She continued that the news agency had found no evidence suggesting its internal systems, even its computers in Moscow office being hacked. As per CNN, NYT has even engaged a number of cyber-security companies towards probing into the assaults.

In the meantime, the FBI said it had nothing to comment, while U.S Secret Service's representatives, who play the role of safeguarding America from cyber-offences, didn't too instantly comment.

Cyber vulnerabilities appear as turning to causing crisis within the Government-of-USA. In 2015, an enormous hack into the Office of Personnel Management compelled the chief officer to resign. Many suspected the hack had emerged from China impacting an astounding 21.5m people.

In the opinion of America's intelligence officers, the NYT breach belongs to one broader campaign targeted at news organizations, think tanks as well as the Democratic Party agencies, like DNC.

Read more... - Attempted Hack Notic...
 
Free Decrypting Keys of Wildfire Ransomware Leads to Dousing of Malware PDF Print E-mail
Written by Administrator   
Monday, 29 August 2016 07:00


Anti-malware experts jointly with cops have thwarted the Wildfire ransom software which was inflicting Web-surfers in Holland and Belgium. Wildfire was proliferated through spam mails while its ransom demand was a maximum 1.5 Bitcoins for decrypting encrypted files.

Security researchers associated with the 'No-More-Ransom' campaign, a combined effort of busting ransomware between Intel, its subsidiary company McAfee, Kaspersky Labs, Dutch police and EC3 cyber-crime cell of Europol, have already posted 1,600 codes that would decrypt files, with more expected.

Ransomware Wildfire was first detected during middle of April when it was dubbed GNL followed with Zyklon after which it was renamed WildFire at May-end and still going.

In June-July, creators of WildFire began several massive spam outbreaks with the ransomware embedded and the messages were targeted mainly at people of the Netherlands. According to MalwareHuterTeam a team of security researchers, the ransomware attacks of WildFire went on during August despite security firms not reporting when the spam first started. Softpedia.com posted this, August 23, 2016.

Some oft-targeted countries with spam -Estonia, Moldova, Russia, Belarus, Lithuania and Latvia weren't attacked with WildFire within one characteristically devised strategy for eschewing attracting local agencies' of law enforcements attention.

Security investigators examining the threat received a gainful recess as the WildFire perpetrators went on registering tailored domain-names in Holland and hosting system-servers within the country.

Apparently, WildFire was executed within certain service model wherein cyber-criminals hired ransomware along with essential infrastructure for carrying out attacks, while the malware authors received commissions between 20-30%.

With this service model available, security researchers developed dual 'free' decrypting keys for unlocking WildFire-encrypted files. Moreover, since they had knowledge about statistics related to WildFire's system server, the researchers deduced that over the past thirty one days, the ransomware contaminated 5,309 PCs when 236 victimized end-users paid the ransom. Overall, revenue incurring to WildFire's creators was 136 Bitcoin ($79,000).

In 2015, security firm Trustwave found that facilitators formed a connection between fresh purchasers and ransomware authors along with essential service offerings comprising encrypting services and traffic pushers. Cyber-crooks employing ransomware usually netted a moderate USD 84,000/month with a $6,000 investment, and earned an enormous 1,425% profit.

Read more... - Free Decrypting Keys...
 
GozNym Malware is Expert in German, Demonstrated by New Malicious Campaign PDF Print E-mail
Written by Administrator   
Monday, 29 August 2016 07:00


GozNym banking malware, the Trojan hybrid that was discovered in the beginning of April by IBM X-Force, is continuing increasing its activity in Europe against banks. In recent times, the team of X-Force discovered the redirection attacks that were launched by crews of GozNym in Germany, targeting 13 banks and its local subsidiaries.

The new schemes of redirection come additionally to attacks based on webinjection for all targeted brands, which demonstrates the significant investment by GozNym in German-language attack capabilities.

IBM X-Force posted a blog stating that GozNym was founded doing launching of redirection attacks against customers of infected German banks, by sending those customers to the malicious websites that pretend to be like the legitimate sites of bank, and then tricking them to disclose their credentials. The team of X-Force observed that redirection schemes "come in addition to web injection-based attacks for all the targeted brands".

It is obvious looking at the timeline of GozNym, the gang which is operating malware has resources as well as savvy for deploying sophisticated tactics of cybercrime against the banks. Securityintelligence.com posted on August 23rd, 2016, stating that the project has been extremely active and growing fast, making it possible to spread to more countries over the period of time.

Dyre gang, the original contriver of malware redirection attacks, just manages in deploying them to Spain as well as English-speaking countries. The operators of GozNym already have 3 different geographies under attack - in 3 different languages, as well as in countries with diverse banking systems.

With the recent GozNym Trojan alongwith schemes of fresh attack that are added to malware in last few months, it was quite clear that the attacks of GozNym are evolving rapidly, turning it into a serious player in the financial threat landscape. Research of IBM X-Force expects to observe further increase in attacks of GozNym in coming weeks, along with growth of redirection attacks to more banks in near future.

Users can prevent infections by malware on its endpoints by ensuring that its operating systems are updated, updating programs which are often used, as well as deleting programs which are not in use. Additionally, sites usually used as the infection hubs must be avoided.

You should make sure to never click on the links or open any attachments in the unsolicited email. Moreover, users should avoid accessing their private accounts from the public computers.

Read more... - GozNym Malware is Ex...
 
NSA has a Most Skillfully Developed Hackers’ Team PDF Print E-mail
Written by Administrator   
Friday, 26 August 2016 07:00


According to a report from The Intercept, a secret agency of USA namely NSA (National Security Agency) is claimed to have eavesdropped on Pakistan's highest civil-military office with the aid of malware. An obscure online group going by the handle Shadow Brokers asserts having stolen a repository of Internet robbery tools from Equation Group a hackers' arm of NSA. Members of Shadow Brokers uploaded few of these tools on offer without charging any price; however, declared that the remaining tools would be sold off to the highest bidder hoping to be valued at over one-half billion dollars.

It's presumed that Equation Group is a contractor that provides service to the NSA. To describe it differently it would be USA's very own hackers' team. Cyber Security Company Kaspersky Lab based in Moscow analyzed Equation Group as an extremely skilled hacking group equipped with resources and sophisticated techniques.

Equation Group's malware server named FOXACID finds mention in leaks by Edward Snowden who once served as contractor to NSA. The NSA when wants to hack into any target uses the method of SECONDDATE to divert that target's Web-browser onto FOXACID. Other methods of NSA's hacks are exploiting security flaws within popular e-mail providers via the dispatch of spam else malevolent web-links which divert onto the server.

The Intercept acquired another document, a newsletter of a critical source operations section of NSA that explains the way NSA used other software besides SECONDDATE for repeatedly diverting Pakistan-based targets onto FOXACID so that the target PCs could be infected and compromised. SECONDDATE malware genuinely exists so confirms The Intercept based on a data exposure that Snowden made. Businessinsider.in posted this, August 21, 2016.

It is irrespective of whether Equation Group is part of NSA, the fact remains that very advanced hacking capabilities can get developed inside United States intelligence agencies.

If Equation Group is adept at finding security flaws, it'll be no surprise for other nation state's high-profile hackers doing the same. As it stands ordinary people dangerously ignore security measures when online while incorrigibly slackens in deploying security updates/patches so essential for fixing software vulnerabilities unveiled from time-to-time.

Read more... - NSA has a Most Skill...
 
Photos on Facebook Lead to Hacking of Facial Recognition System PDF Print E-mail
Written by Administrator   
Friday, 26 August 2016 07:00


Most tech firms depend on the technology of facial recognition to verify their users. But the researcher's team from North Carolina University in security conference of Usenix that has recently taken place in Austin disclosed that the technology of facial recognition is not quite ideal in the sense that it is commonly believed, and it can also be exploited.

When it was further investigated, the researcher's team disclosed that the profile pictures of Facebook are responsible for the exploitation. During the conference, research team also displayed the technique by which attackers are able to compromise systems that use the facial recognition as their key verification technique. They created the 3-dimensional facial models, and have effectively used that to deceive all the 4 systems of facial recognition. These models are mainly created with the help of photos which are available openly. The pictures are displayed through mobile virtual technology in trying to trick the technology of facial recognition.

UNC team collected 20 volunteers to experiment via proficient photographs, picture web indexes, as well as freely available resources on the informal communities such as Linkedln, Facebook, and Google+ and built 3D models of their faces. Later on, these were tweaked to have various facial animations, and eyes are also adjusted to show that they are looking at camera.

All five systems that were tested - Mobius, 1D, KeyLemon, BioID, and TrueKey - are available in the iTunes Store and Google Play Store. Although Google has warned before that similar software "is less secure than a PIN, pattern, or password," because "someone who looks similar to you could unlock your phone," it could be much easier than believed before.

Hackread.com posted on August 22nd, 2016, stating that the lone solution is embedding of hardware and sensors, and adoption of preventive measures by going beyond webcams and mobile cameras.

Team member True Price said: "some vendors -- most notably Microsoft with its Windows Hello software -- already have commercial solutions that leverage alternative hardware. However, there is always a cost-benefit to adding hardware, and hardware vendors will need to decide whether there is enough demand from and benefit for consumers to add specialized components like IR cameras or structured light projectors".

Read more... - Photos on Facebook L...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1435
Polls
The Spamproblem is
 
Who's online
We have 66 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us