Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Asda Cautions Buyers about Scam E-mails PDF Print E-mail
Written by Administrator   
Tuesday, 07 July 2015 07:00

Asda, a chain of supermarkets in Britain under the ownership of an American, headquartered at Asda House, Leeds, West Yorkshire, United Kingdom recently called on everyone for being watchful about scam e-mails presently circulating online while claiming as Asda messages, published thedrinksbusiness.com dated June 26, 2015.

It maybe noted that Asda is a retailer of clothes, toys, food, general merchandise as well as financial services.

A particular electronic mail that Champagne Pannier received asserted as coming from commercial director of the chain Rebecca Williams dealing in Asda's grocery along with BWS Europe. It asked the business for providing 3,000 bottles to Asda spread over certain credit line of lengthy duration, urging for a quick quotation.

Supposedly coming from the overseas selling department of Asda as also displaying a sender's id This e-mail address is being protected from spambots. You need JavaScript enabled to view it , the e-mail isn't actually from Asda.

At the time the drinks company contacted Asda, the latter informed of its knowledge about the scam as also that it was helping in an investigation by the police. Asda substantiated it hadn't sent the electronic mails got.

An Asda Spokesperson stated that the company had written to all suppliers regarding establishing a direct contact with Asda incase they got the particular e-mail. According to the Spokesperson, Asda was ensuring its suppliers weren't getting trapped into it. Thedrinksbusiness.com published this.

Disturbingly, it isn't unprecedented for scammers to exploit Asda's name through fake electronic mails.

During October 2012, shoppers cautioned people of phishing e-mails that seemed as coming from Asda; however, happened to be really fraudsters' effort for garnering personal data. Customers getting the fraudulent electronic mail were informed they were winners of one free gift card to do shopping at Asda for a value range amounting 50-1,000 pounds. The e-mail directed customers for following certain web-link that landed them on a site wherein they were solicited for providing private information like their name, birth date, e-mail address, postal address as well as cell-phone number. The site pledged for enlisting the customers' names to certain lottery draw towards winning free shopping for 12 months at Asda.

But, then also Asda had confirmed little association with the particular electronic mail.

Read more... - Asda Cautions Buyers...
 
Phishing Grows as Compared to Social Media Lures - Proofpoint PDF Print E-mail
Written by Administrator   
Tuesday, 07 July 2015 07:00

Security firm Proofpoint says that cyber-criminals have adapted their phishing campaigns rapidly over the last year leaving social media lures in favor of a new focus on business users with templates of communication notification.

The security firm compared the findings of its 2014 report The Human Factor with its 2015 version and observed some clear differences.

94% decline in inviting lures using social media was the first and foremost difference.

Fake Linkedln invites used to be the main variety - with double of these than any other social media phishing lure.

These were substituted by so-called "communication notification" phishing emails out of which voicemail and fax notifications were probably the most common.

Interestingly, tactics moved considerably in September 2014 as organized cybercriminal phishing campaigns spreading mainly Dridex banking Trojan adopting malicious Microsoft Word document attachments as their main delivery tool. This trend continues to accelerate in 2015 too.

Proofpoint says that there were 56 different attacks which employed macros to deliver Dridex Trojan and sometimes deliver numerous million maligned emails in one day.

Networksasia.net published news on 29th June, 2015 quoting Kevin Epstein, Vice President, Advanced Security and Governance at Proofpoint, as saying that there were two grounds for this. Macro authors got better at dodging security systems and drive-by downloads got tougher to execute.

To successfully install malware through a browser download, the scamsters have to identify a virus in the browser and then pen code to take benefit of that virus.

Epstein said that it is not inexpensive and easy to find these flaws.

Moreover, once the first malware attacks, everyone learns about the vulnerability, it gets patched and people install the fixes or updates and the window of opportunity for the scamsters restricts radically.

However, that is not the case with macros.

Unfortunately, users continue to opening phishing emails and clicking on attached files in spite of being trained.

Hence, organizations can never underestimate the human factor...workers will almost always click. They must implement an advanced malware protection strategy including threat intelligence and targeted attack protection to curb opportunities for end user to interact with phishing messages before employees can click.

Read more... - Phishing Grows as Co...
 
‘Click Fraud’ Activity Could Enable Insertion of Ransomware PDF Print E-mail
Written by Administrator   
Monday, 06 July 2015 09:00

Damballa the security company in its most recent Q2-2015 State of Infections Report states that hackers of a computer primarily using it for a comparatively less vital objective such as carrying out click fraud, meaning fraudulent campaign for extracting money through pay-per-click advertisements, now utilize it for delivering several infections in a chain that in just a while would result in insertion of CryptoWall a venomous ransomware.

Damballa's discoveries follows an assessment of certain click fraud malicious program called RuthlessTreeMafia that Botnet Asprox had introduced. When any computer loses its control to the particular botnet, operators of RuthlessTreeMafia manage to sell the ability to acquire admission into the hijacked computer so buyers with downloaders would install Trojans Rovnix and Rerdom, yielding more income to the criminals.

Essentially, with continuation of the click fraud contamination, ransom software CryptoWall infects the computer, locks all its files within seconds and prevents its user from accessing the system. So long as the computer experiences criminal's hold, the latter keeps making money via the hijacked system. In 2-hrs time, 3 more click-fraud contaminations escalate from the first one over the hijacked computer besides the CryptoWall itself.

Damballa's report indicates that a venturing security team possibly wouldn't ever have observed the above change till they were devised for examining post-hijack activity.

Thus, according to Chief Technology Officer Stephen Newman at Damballa, the report outlines that sophisticated malware can fast multiply as also it isn't solely the first medium of contamination that matters, but it is of comprehending the continuously progressing activity spanning a length of time. Computerweekly.com published this, June 26, 2015.

Newman says that the complexities coming with sophisticated contaminations imply that an apparently less dangerous threat as click fraud (within the current instance) can yield entry to even more perilous e-threats.

He further describes the above kind of attacks' changing nature as emphasizing for adopting advanced detection towards overcoming the increasingly treacherous threats. Since it takes little time for infections to disseminate across any PC-network, information technology personnel require adopting proactive measures for eschewing any click-fraud instance from occurring, Newman concludes. Softpedia.com reported this, June 26, 2015.

Read more... - ‘Click Fraud’ Ac...
 
Hackers Tricked a London Based Woman of Life Savings PDF Print E-mail
Written by Administrator   
Monday, 06 July 2015 09:00

BBC.com published news on 24th June, 2015 stating that a 59 year old woman namely Vivian Gabb, based at London, explained how she was cheated of her life savings by scamsters who sent her a phishing notification in her inbox.

Mrs. Grab, a Pilates and tennis trainer, was finalizing a house to buy when the fraudsters struck.

She did not know that her email account had been hijacked and cybercriminals could monitor each and every email she sent and received.

They emailed her a message hidden as a follow-up mail from her solicitor Chris Smee, asking her to deposit around 50,000 Pound into their account.

It emerged after four days that the money had not gone to her solicitor (referring to Chris Smee) but instead gone straight to a scam creator.

The fraudster had created an email address and a TSB bank account under the same name as her solicitor.

By the time, she reported her banker Halifax about the incident, the money had already gone out of TSB account of the criminal.

Dailymail.co.uk published news on 24th June, 2015 quoting Mrs Grabb as saying "I had thought that banks would have done everything to trace the money and freeze it but it seems that nobody have any sense of urgency."

Mrs Grabb says that Halifax has confirmed that they are not responsible in any way for this incident and TSB will not talk to me due to issues related to protection of data.

Dailymail.co.uk published news on 24th June, 2015 quoting an explanation by Spokesman of Halifax as "this type of scam is known as 'social engineering' which is a non-technical type of intrusion used by hackers which depends heavily on human interaction and frequently involves fooling people in breaking normal security procedures."

Unfortunately, it is not only UK but senior citizens all over the world are targeted by cyber criminals with a case being reported from Texas. Wanda Barcomb, a retired licensed tax preparer, recently received a fake email claiming to be from IRS, American taxing agency, asking her to call on a number given in the fake email. However, Barcomb knew that it was a scam email.

Read more... - Hackers Tricked a Lo...
 
Operators of Winnti APT Group Moving Ahead of Gaming Sector - Kaspersky PDF Print E-mail
Written by Administrator   
Monday, 06 July 2015 09:00

Security experts of security firm Kaspersky say that they have recently acquired proofs which prove that Winnti APT (Advanced Persistent Threat) is heading beyond the gaming sector and moving to other significant industries.

Kaspersky first discovered Winnti in 2012 and samples of the malware were seen used by threat actor Axiom Group, whose actions were prevented during Operation SMN in 2014, which involved numerous security firms led by Novetta, a company offering solutions of advanced analytics.

Softpedia.com published news on 23rd June, 2015 quoting Dmitry Tarakanov, a Security Researcher with Kaspersky, as saying "Winnti group had been known as a Chinese threat actor for very long targeting companies particularly.

According to the experts, Winnti group has been operating since 2009 targeting over 30 gaming businesses and striking different well-known online games.

However, recent conclusion reveals that the campaigns of the Winnti group target institutions of wider range of sectors because Kaspersky collected samples which suggested an attack on a "popular global pharmaceutical enterprise headquartered in Europe."

The researcher did not reveal the name of the victim which is being targeted but Wikpedia says that six out of the top ten companies ranked revenue wise as per their 2013 annual reports are from Europe: GlaxoSmithKline, Roche, Sanofi, Novartis, Bayer and AstraZeneca.

Besides this campaign ID, researchers of Kaspersky found other clues supporting cyber-espionage activity targeting pharmaceutical industry. The sample of Winnti which was analyzed included a network rootkit signed with an embezzled certificate allocated to a division of a large Japanese holding.

Securelist.com published news on 22nd June, 2015 quoting a blog of Tarakanov as "although this division is concerned with microelectronics manufacturing other divisions of the conglomerate's business (referring to Japanese holding) includes drug development and production along with medical equipment."

The researchers have not given any information about the contribution of operators of Winnti but according to researchers, the exclusive sureness at this moment is that the gang is going past the Internet gaming industry and running cyber-espionage campaign against businesses in other sectors like telecoms and large pharma.

Read more... - Operators of Winnti ...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1288
Polls
The Spamproblem is
 
Who's online
We have 106 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us