Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Qadars Trojan Gears Up to Attack Banks of UK PDF Print E-mail
Written by Administrator   
Tuesday, 27 September 2016 07:00


As per IBM X-Force Research, updation of Qadars Trojan was done for improving its defences, and it has been tailored for targeting 18 banks of UK. Infection campaigns that are launched in the early part of this month, has mainly targeted banks in Germany, US, and Netherlands; however researchers recently have found facts proving that banks in UK have also been added in that list.

As per the belief of security researchers, Qadars active from 2013 is probably brainchild of "Russian-speaking black hat", and is also considered as an "advance online banking Trojan" most probably originating from "single source".

Cyber criminals have started focusing on UK again with renewed action, after a time when Brazil, US and Germany are getting targeted by the malware.

X-Force Research reveals that even though most of the targets of Qadars were banks, malware's configurations during recent month's shows that online sports betting users, social networking credentials, payment & card services, and e-commerce platforms is also targeted by it. Computerweekly.com posted on September 21st, 2016, that researchers believe experienced groups of cybercrime is supporting Qadars because malware tactics of advanced banking from the very beginning has been used by the malware.

The malware further uses the social engineering to try gaining complete access of the victim's systems and then steal his/her data, including data safeguarded by the two-factor authentication systems normally used by the majority of banks. Moreover, the Trojan can also comprehensively monitor the injected devices as well as hijack text messages from the victims' phones.

As per the researchers, Rig Exploit Kit through EiTest campaign is used by Qadars for infecting users, which facilitate its infiltration with the downloader malware. Researchers added that Qadars latest version is advanced online banking Trojan coming from single source. Fraud tactics of Qadars are enabled with the help of techniques like cookie & certificate fraud, code injection, form grabbing and ATS.

Qadars can do in-session fraud by remote-controlling infected endpoint through virtual network computing, and executing a real time fake transaction when user is already logged on.

Activities of Qadars are fairly limited as well as modest, compared to the other flourishing banking Trojans like GozNym or Dridex. However, researchers consider this as a deliberate trick of malware's developers in trying to avoid detection.

Read more... - Qadars Trojan Gears ...
 
Sophisticated RAUM Tool Replaces Torrent Files with Malware PDF Print E-mail
Written by Administrator   
Tuesday, 27 September 2016 07:00


RAUM, one fresh and refined tool is the latest discovery in the cyber-crime world. It attacks innocent Web-surfers who surf torrent sites to download media content else popular software, by substituting them with malicious software.

InfoArmor an Internet security firm describes RAUM as being utilized for particularly turning torrents into weapons for proliferating different ransomware strains such as Cerber, CTB-Locker and CryptXXX, as well as Dridex the banker Trojan and Pony the password grabbing spyware. This task gets done via two-prong assault.

InfoArmor further reports that a very desirable target of RAUM is Internet games played on PCs and the files which activate the Mac OS and Microsoft Windows operating systems.

The security firm states that Black Team an organized crime syndicate from Eastern Europe has effectively monetized the unlawful operation by actively providing RAUM tool across underground networks through the pay-per-install scheme. One unusual infrastructure is involved which lets end-users handle fresh malicious downloads with the aid of one huge network of virtual servers that run all the time, including compromised PCs. Infosecurity-magazine.com posted this, September 21, 2016.

People who rely on torrent websites, notes TorrentFreak, for acquiring games and software and not music and video files have the greatest possibility to contract RAUM along with related malicious programs.

The above reporting insists that end-users be wary about the dangers while making access to torrent files. According to TorrentFreak, for remaining secured, it is best not reposing faith on apps that are freely-downloadable online.

InfoArmor discloses having detected 1,639,000-and-more records garnered during recent months from contaminated end-users having different credentials for accessing social media, gaming sites, online services, corporate resources as well as sent out databases from the publicly exposed criminal network.

InfoArmor, the company said, strongly suggested taking the greatest caution while accessing torrent tracker websites alternatively taking down pirated digital material, business software and operating systems.

Further, it'd be good browsing via Mozilla's Firefox and Google's Chrome web-browsers and using the freely-offered security protection from Malwarebytes the company that detects malware.

Meanwhile, the just mentioned tools for security and browsing have deactivated the Internet Protocol addresses which have been found to source RAUM.

Read more... - Sophisticated RAUM T...
 
Victoria Residents in Australia Target Of Hazardous USB Sticks PDF Print E-mail
Written by Administrator   
Tuesday, 27 September 2016 07:00


Victoria residents in Australia have just realized an attack being targeted on them via USB memory sticks arriving from nowhere to lie in their letterboxes. The state police of Victoria have posted an alert on its official website telling that when these USB sticks are plugged into users' computers, the victimized users will receive fake offers of media streaming facility along with experiencing other severe problems.

Unfortunately, such instances wherein tainted devices are proliferated or dumped in public places are not unknown. Cyber-criminals do the same thing for disseminating their malware alternatively other hazardous codes fast among unwitting users. It is assumed that even spying organizations make use of such techniques. What's more the sticks sent from apparently genuine places too can be pretty hazardous. Surveys conducted reveal that an enormously unexpected number of individuals just lift apparently thrown away USB sticks and even use them.

The described attacks have presently occurred solely in Pakenham a tiny, noiseless town having as small as just a little more than 30,000-sized population and situated 56 km away from Melbourne in the south-east direction. And though some miscreant has discovered an uncommon technique of spreading malware that could be banking Trojans also, the problem that individuals without pondering insert USB sticks inside their PCs isn't unprecedented. Softpedia.com posted this, September 21, 2016.

According to one more survey conducted in April 2016, an investigator for cyber security following a TV program after Mr. Robert dropped 300 USB drives near the campus of University of Illinois Urbana-Champaign. The investigator felt perplexed when he discovered that 98 of those drives had been collected while 48% of end-users actually used them and attempted at opening the files and operating on them that were inside the drives.

Furthermore, considering that only in August an organization from Hong Kong too began selling one USB drive which short-circuited the PC into which it was plugged, it is advisable that consumers exercise greater caution while handling freshly discovered USB drives.

In the meantime, Victorian police have been asking residents to get potential clues which could aid in catching the perpetrators of the contaminated hardware.

Read more... - Victoria Residents i...
 
Researchers Demonstrate Hack into Tesla Car Model Remotely PDF Print E-mail
Written by Administrator   
Monday, 26 September 2016 07:00


Tesla Motors manufacturers most ardently and proactively maintain cyber security for its vehicles that is renowned globally. It offers many features, among which one bug bounty module is notable. However, the software programs inside its motors are sometimes inflicted with security flaws.

Tencent a Chinese technology firm discovered several flaws in Tesla cars, which if exploited together, let the firm's researchers remotely gain hold of one Tesla car Model S while regulate its door locks, central display, sunroof as well as the brakes. While exploiting the flaws, the researchers were also able in gaining admission into the CAN (controller area network) bus of the car that enables Tesla car's specialized computers exchange messages between each other.

However, there are some essential prerequisites for the hack. The vehicle's in-built browser must be running and there must be certain malicious WiFi connection for the car. The researchers' group notified Tesla about the security flaws it discovered, and the motor company released one security patch and rectified the problems. Gizmodo.com posted this dated September 20, 2016.

While carrying out the hack, the research team attacked the car's CAN bus, which is a network of PCs that any modern vehicle contains to regulate everything such as brakes, indicators and others. The vulnerability was demonstrated via a video even as the hack was shown targeting Model 75D and Model S P85 of Tesla, albeit other models could also be similarly hacked.

Within one blog post the researcher hackers stated that they lauded Tesla's proactive efforts and approach towards issuing the fix for the flaws efficaciously.

Tesla getting experimentally hacked occurred in the past too when researchers belonging to University of South Carolina managed in duping the autopilot mechanism of Tesla Model S such that it seemed to perceive objects while they didn't exist alternatively, missed noticing an object actually on the car's path.

Thus as interconnection among cars grows, there will also increase methods by which hackers will be able to hack from the remote. Hence, it is vital that the PCs operating crucial safety measures are set apart from other computers and properly safeguarded.

Read more... - Researchers Demonstr...
 
Tweaked Android Trojan Gains User Privileges and Pilfers Files, Chrome’s Database PDF Print E-mail
Written by Administrator   
Monday, 26 September 2016 07:00


A banker Trojan called Tordow that targets Android phones has been equipped with one exploit so the malware can acquire root privileges. The kind of Trojan is wholly unprecedented. Tordow was detected during February 2016 and since then it has
apparently been tweaked to evolve into its latest form.

According to Anton Kivva, malware analyst at Kaspersky Lab, the majority of applications, which proliferates Tordow, exactly copies more widely used Android applications. These are Pokemon Go, DrugVokrug, VKontakte, Subway Surf, Odonklassniki and Telegram.

Miscreants download these applications, take out the source codes, incorporate their own malevolent ware into them, package them again as also upload the just prepared copycat apps onto intermediate application stores. When these applications are downloaded on end-users' devices, the malicious ware gets triggered, but only once when the apps are launched first time.

Tordow's activities, among others include pilfering credentials from web-browsers (default Android web-browser alternatively Google's Chrome) that the infected devices run, and spying on phone calls or SMS messages. The ability to record browser
details enables crooks to garner victims' bank account details, including cookies, passwords and other log-ins, provided they're kept inside the web-browser. Threatpost.com posted this, September 20, 2016.

Tordow targets a local file for pilfering data from Chrome on Android and Android's stock browser. The data, along with having the mobile owner's browsing history, contains the passwords that he uses.

The situation worsens because attackers by gaining super user privileges become capable of pilfering any file, including documents, photos as well as files having more information regarding the infected mobile. Attackers can also restart the device, load and remove applications, steal contacts and make calls because of the Tordow Trojan.

Kivva says that of late there has been a trend of more and more malware looking to gain root access. Just coincidentally, the first banking Trojan for mobile phones has been spotted during the time, doing just that. Therefore, it is extremely vital that people safeguard their Android mobiles from the above kind of threats since it is nearly impossible for erasing the malicious program the moment it acquires root access.

Read more... - Tweaked Android Troj...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1446
Polls
The Spamproblem is
 
Who's online
We have 321 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us