Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Malicious E-mail Scam Pretending to Provide Air Ticket Identified PDF Print E-mail
Written by Administrator   
Saturday, 01 November 2014 08:00

According to Cyveillance, a security company, one malware-laced spam mail run, spotted over a month back, alluring Internauts for clicking on bogus e-tickets for airplane travel, continues to thrive, published dated October 24, 2014.

A series of details appear on the said spam mail such as the ticket number, departure time and date, seat number and destination of travel related to the airplane ticket, which the e-mail recipient supposedly bought.

The document containing the details seemingly arrives from Delta Airlines through an attachment whose print out the user is supposed to take to avail the ticket.

The researchers from Cyveillance Security Company recognized the malware within the attachment as Trojan Weelsof that is actually a ransomware, which upon infiltration freezes the target desktop, while exhibits a missive demanding ransom for restoring back the computer.

The missive asserts as coming from the officials who've apparently found unlawful matter on the contaminated PC. It then elaborates the way the ransom payment should be made via pre-paid cards, a payment mode that is legally a disqualification. However, the good thing about the malware is that it doesn't have the usual file encoding capability; consequently, no harm is caused to the data that's stored inside the infected computer.

But Weelsof can be removed for which Cyveillance suggests executing an anti-virus scan only from offline during booting of the PC because downloading anti-virus software from the Net won't be possible owing to the locking up of the device.

Interestingly, within an incident about impairing services of users' profile, F-Secure another security company highlighted one instance where a scam electronic mail reaches the about to be victimized user who finds a ticket attached in a file for the identical place he was planning to visit.

In conclusion, it isn't Delta Airlines alone which e-mail scammers have attacked recently. Last year (2013) during the month of October, security researchers identified an e-mail posing as communication from Qantas an airline company of Australia which asserted that the company was looking for employees and so inviting people to apply with their resumes to enable selection of suitable candidates.

Read more... - Malicious E-mail Sca...
Phishing E-mails Target Students of Miami University PDF Print E-mail
Written by Administrator   
Saturday, 01 November 2014 08:00

Scammers are distributing fake e-mails pretending to be messages from Oxford, Ohio, USA based Miami University as they strike the mailboxes of students of the University, published dated October 21, 2014.

Asking that students require confirming own passwords, the malicious electronic mail provides a web-link to follow but actually diverts the user onto one copycat site of the Miami University website.

A sample e-mail was found that duped a senior student Ms. Abby Cramer, thus published

Ms. Cramer said that she definitely found the e-mail weird. She did not find the sender's id familiar, but since the title contained the word 'Miami,' she opened the message. Later, she followed the web-link once she accessed her laptop and found the web-page just as Miami's page, thus she did as per the instructions while for some days at length, nothing happened.

But thereafter, she noticed many queer messages inundating her inbox. Soon all the e-mails had a caption "Failed Recipient" something that indicated to her she'd gotten hacked.

Disturbingly, it's because of the aforementioned kind of phishing e-mail scams which have resulted in an increase in phishing online, security analysts examining the aforesaid spam mails remark.

They caution never ever to think a request for details as genuine till one is cent percent definite about the source from where it follows. Genuine organizations alternatively the University within the current instance won't ever ask anyone to provide his username or password. Just as with most other scams, when a suggestion appears incredibly true it's as best not to believe it.

The finest manner in which one can remain safe from a phishing attack would be by acting wise while not reposing faith in an e-mail that some unfamiliar source has sent. Web-links inside dubious e-mails shouldn't be clicked. When unsure about any content of an incoming e-mail, questions should be asked for, the Information Technology support services is always there to extend help.

Nevertheless, incase anyone has by now been ensnared with the above phishing electronic mail then he/she should reset his/her password as soon as possible, the security analysts suggest.

Read more... - Phishing E-mails Tar...
Bitcoin Ransomware Virus Paralyzes Italian Councils PDF Print E-mail
Written by Administrator   
Friday, 31 October 2014 06:00 reported on 22nd October, 2014 stating that computer files of Municipal council offices across Italy have been encrypted by a ransomware virus which is demanding payment in Bitcoin.

Corriere della Sera, one of the country's top newspapers, reported that dozens of local office employees are not able to pay bills, issue certificates or access server documents unless they give the digital ransom.

Presently the attacker's fee is 400 Euros worth of bitcoin and this amount is believed to double after three days.

The virus was launched from a location in St Petersburg, Russia and it spreads quickly through the system network of the council through phishing emails. Many are still at risk but some machines have been updated with antivirus software to block it successfully.

Once the malware enters into a victim's machine, it sends an ordinary looking .PDF file bearing an elongated series of characters to all links in their email address book.

On being examined closely, the file is actually found to be a malicious .exe program.

When the contact opens the program, it encrypts all photos, .PDF files and documents of Microsoft office on their server and machine making them useless.

When the block is enabled, a phony anti-virus prompts users to purchase decoding software along with step-by-step instructions necessary to complete the process and transiction. The scammers even included contact details of customer support for those who are not known to Bitcoins use. published news on 23rd October, 2014 quoting Maria Grazia Mazzolari, a town clerk in Bussoleno, Turin (Italy), as saying "Even after paying the ransom, the hackers had the impudence to invite me to call them in case of any problems."

The stunt seems to be lucrative till now. Di.Fo.B, an Italian consultancy dealing with cybercrime, stated that the bitcoin addresses filed by attackers have received around $100000 from all victims during last 6 days.

Di.Fo.B also expects that this figure will go up because many targeted public offices are still not aware of the spread of this virus.

The consultancy added that this specific virus is a variant of the renowned CryptoLocker which is dubbed 'TorrentLocker'.

Read more... - Bitcoin Ransomware V...
Damballa in its Q3-2014 Report Reveals Surging of Malware Threat PDF Print E-mail
Written by Administrator   
Friday, 31 October 2014 06:00

Damballa, a threat protection specialist, has launched its report of threat protection for Q3-2014 revealing that the malicious software threat is continuously rising.

According to the report of last quarter (referring to Q3-2014) the blaring businesses experienced 138,000 incidents in a day which is 32% more than Q2-2014 with patrons experiencing 37% devices on an average per day.

However, there is some good information as there has been 40% drop in daily infections compared to prior quarter. This is because patrons employing technologies such as automatic incident detection to respond to threats and recognize true positives.

But the chief worry is a surge in point of sale malware because Damballa identified a 57% surge in Backoff infections from August-September and a 27% increase only in the month of September.

US government has reported that Backoff is a fresh breed of exceedingly targeted POS (point of sale) malware which has infected around 1,000 businesses.

In September 2014, Home Depot, a popular and renowned American retailer, said that the notorious malware has stolen payment information of around 56 million customers over a five month period. Unfortunately, Jimmy Johns, Dairy Queen and Kmart, a subsidiary of Sears, also reported of breaches carried out by cyber crooks. published news on 24th October, 2014 quoting the comment of Brian Foster, Chief Technical Officer of Damballa, on the findings of the latest report as: "Primarily, these figures illustrate that prevention control cannot stop infections by malware. POS malware and other sophisticated threats can and will infect and we simply cannot protect our network with tighter security walls. Hence security teams face trawling through a tsunami of procedures every day and hence correlating these manually to locate the true positives is just not feasible. Instead, organizations need to focus on building better intelligence to locate the real threats. Good news is that if you correlate evidence, then you can have significant impact on reduction of number of tainted devices within the network. We'd suggest businesses to be prepared, to move ahead by assuming that they will be hijacked and take practical measures to prepare for remedies."

Read more... - Damballa in its Q3-2...
Hackers Pretending to be WHO Distributing Ebola-Themed Spam Mails PDF Print E-mail
Written by Administrator   
Thursday, 30 October 2014 08:00

According to SpiderLabs a cyber-security band, hackers, pretending to be WHO (World Health Organization) a global health agency, have launched malware-laced spam mails targeting unwitting users as they're tricked with an Ebola pandemic fright so they'd view the malicious messages, published, October 26, 2014.

Displaying a header "Ebola Safety Tips-By WHO," the malicious e-mails tell how recipients can protect themselves against the lethal Ebola virus.

The e-mails display other headings too - "So Really, How Do You Get Ebola?" "What You Need To Know About The Deadly Ebola Outbreak," "The #1 Food Items You'll Need In An EBOLA Crisis," and "Is there ANY way to cure Ebola?"

SpiderLabs also cautions about the e-mails' writings which try convincing readers towards pulling down an attached file having anti-Ebola security measures.

So one sample message that SpiderLabs's blog shows tells that the information along with preventive measures catalogued within the attachment would assist the reader as well as people around him remain protected.

It elaborates there's one epidemic of Ebola as well as diseases of other kinds at the recipients' places about these users know nothing; therefore, they should download the WHO file to get extra info regarding the way they can remain protected against Ebola as also the other preventable illnesses. The message ends with 'We care.'

But, if anyone opens the e-mail, he would download one RAR file carrying software for letting the hackers gain admission into his PC as well as its data.

The loaded malicious program would further load a Remote Access Trojan namely DarkComet that most anti-virus solutions can't detect.

The Trojan solely impacts Windows systems and not Mac computers, as these don't allow RAR file hosting that could enable spam/malware dissemination.

Meanwhile, although the campaign seems as getting quite widespread, fortunately specialists haven't still confirmed if it's any full-time scam. However, given that usernames and passwords have lately leaked from different social media websites, authorities think they should caution people early on about such dubious electronic mails. They suggest that maintaining one's security system up-to-date, while avoiding viewing any electronic mail of the aforementioned type, is the best manner for remaining secure.

Read more... - Hackers Pretending t...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1200
The Spamproblem is
Who's online
We have 27 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us