Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

BLOG
E-mail Scam Asserting as Distributing JB Hi-Fi Goods for Free PDF Print E-mail
Written by Administrator   
Friday, 28 August 2015 07:00


CAV has come to know about one e-mail scam that poses as distributing freebies from JB Hi-Fi the retail chain for entertainment, published consumer.vic.gov.au dated August 25, 2015.

It maybe noted that as government organization of Victoria State in Australia, CAV promotes and safeguards people's interest when they buy things.

The fraudulent electronic mail states that the e-mail recipient has been chosen as benefited with a scheme known as "A Wish for Your Friend" under which he/she can select a tablet device or smart-phone for his/her friend.

So for choosing the item, the user requires clicking one given web-link, the messagestates.

Under this situation, CAV cautions recipients of electronic mails supposedly offering consumer items to determine the messages' veracity by checking with their senders. So it's suggested that no web-link leading onto websites that's unrecognizable to the user must be clicked.

The organization adds that it got 185 complaints about illegitimate advertising campaigns involving bogus electronic mails during 2014 April-2015 March.

Michael McKinnon Security Advisor with AVG stated that possibly the apparently harmless bogus e-mail promising JB Hi-Fi items had nefarious intentions. SmartCompany.com.au reported this, August 26, 2015.

Meanwhile, the case of JB Hi-Fi happens to be of the most recent Australian retail seller exploited within an e-mail fraud. Other companies whose customers too have been tricked lately are Aldi, Coles and Woolworths, says McKinnon.

McKinnon further says the web-links seem as taking onto pages which solicit plentiful information, with one oddly asking the user the maiden name of his mother. Consequently, one becomes sure of the current scams as moving ahead within the ID-theft trail. The advisor states the scammers possibly considered JB Hi-Fi as one easy target since it's a leading retail trader, and so it's still one more instance of a fraud dependent and riding on reputable brands' goodwill.

McKinnon thinks that if any business has a wide recognition of its brand inside certain regions, that business is regarded as a fair target for scammers' schemes. The more a company brand experiences widespread recognition, the greater is the possibility such a business' brand will be exploited within a scam likewise as above.

Read more... - E-mail Scam Assertin...
 
New Sphinx Appears as Banker Trojan Zeus Variant PDF Print E-mail
Written by Administrator   
Friday, 28 August 2015 07:00


One fresh version of Zeus Trojan the well-known banker malware is circulating in the wild. The version called Sphinx has been observed on an illegal trading site as it uses Tor network for operation. Hakspek.com published this dated August 26, 2015.

A customer going by the name SphinxTrojan posted the Trojan on Crime Network an underground online portal on August 15, 2015. The programming language used to write it is C++. It is created for working particularly via Tor network so that it remains anonymous. It's believably unaffected from Zeus tracker, blacklisting and sinkholing.

The backend utilizes certain PHP, server-side programmed Web panel having 'mysql' and 'mbstring' extensions.

At present, the selling price of the Sphinx toolkit has been fixed at USD500 for every binary. For payment, the Bitcoin crypto currency has been decided with the mode-of-payment as DASH. The purchasing process starts with buyers registering on an Internet site for paying the price. This leads to automatic validation of the consumer's A/C followed with letting him access for modifying his config as well as asking for a build.

Sphinx's creators describe the Trojan as crafted for working on Windows 7 and Vista where the UAC meaning User Account Control is active. The Trojan is also operative on weakly privileged user accounts in particular the "Guest" A/C. Securityweek.com published this, August 26, 2015.

According to a forum post dated August 15 that advertises the malware's capabilities, Sphinx's Backconnect Virtual Network Computing lets its consumers transfer money straight from the contaminated PC. The capability as well aids in deactivating security software that's enabled on victim's system. With the Trojan's Backconnect SOCKS, attackers can make SOCKS proxy of their victim.

Sphinx as well enables crooks to filch from the Net digital certificates for use afterwards in authorizing malware. They can also employ web-injects for modifying a website's content with the purpose of duping victims into divulging secret data.

To communicate with its CnC infrastructure, Sphinx resorts to whitelisted processes so as for evading firewalls.

The Sphinx trader recommends utilizing traffic from Internet Explorer to work with the exploit toolkit that would yield the highest profit from Sphinx.

Read more... - New Sphinx Appears a...
 
Dyre Now More Advanced, Identification and Removal Difficult, Warn Security Pundits PDF Print E-mail
Written by Administrator   
Thursday, 27 August 2015 09:00


According to security researchers, the infamously known Dyre banker Trojan's developers are currently employing certain fresh tactics so that the malware gets far harder in identifying and eliminating, published securityweek.com dated August 24, 2015.

At IBM, the security investigators find Dyre's creators seeking to change persistence system of the malware while substituting Windows Registry's run keys by task scheduling.

According to Malware Researcher, Or Safran with IBM Trusteer, the registry continues to have the instructions; however data-files that the scheduler runs is now available within one already set Windows Tasks directory, the place to fetch the data-files whenever required. With Dyre's run being changed to certain scheduled task, the malware gets increasingly resilient to security products' identification and elimination. Nevertheless, the Trojan's creators are also enabled with flexibility towards fixing the time to run as well as the frequency they want alternatively the OS type they would choose for rerunning the malicious program, Safran explains. Securityweek.com published this.

In one more change Dyre creators give semi-random names to the instructions filled configuration files. This they hope will stop automated security products from recognizing their creation and getting it removed.

The change is brought about with a mathematical manipulation that will give separate file-names to each end-user but one that will be constant for every end-user's computer. For doing this, Dyre utilizes both the end-user and his computer names to form the chief parameters for the Trojan followed with concatenating them. Dyre subsequently picks up that alphanumeric thread followed with performing one hashing operation namely SHA-256 on that string, and thereafter churn the end-result in the form of a fresh string.

The above alterations depict that Dyre made more sophisticated or any malware likewise works like an ever-shifting ware, which keeps changing for eluding static security while keeping its stay within contaminated end-points.

Trojan Dyre, regarded as that banker malware which's most sophisticated, is employed during widespread financial assaults against online-banking clients as well as within targeted raids against big-sized business accounts valuing multi-million dollars that IBM Security earlier named Dyre Wolf scams. The latest Dyre attacks, however, have been numerous against banking institutions within Spain.

Read more... - Dyre Now More Advanc...
 
Malvertising Incidents Threefold In 2014, Finds Cyphort PDF Print E-mail
Written by Administrator   
Thursday, 27 August 2015 09:00


According to one fresh report that Cyphort the security company has released, malicious advertisements that serve badware have tripled in number during 2014.

Malvertising, also referred to as advertising malware, characteristically gets served through intermediate ad-networks. After buying space on the Internet, the hacker posts a harmless-appearing ad with the idea to get it served on several online sites. However, clicking on the advertisement alternatively brushing the mouse over it enables exploitation of Adobe Flash vulnerabilities by the hacker for loading malware onto the victim's computer. The trick is rather horrible, while it frequently kick starts even when the target victim makes no mistake.

A particular attack, which Cyphort detected during January 2015, hijacked an ad-network namely AOL as well as resulted in malverts getting exhibited on prominent websites such as theindychannel.com, FHM.com, HuffingtonPost.com, weatherbug.com and LAWeekly.com.

One more emerged during February 2015 from Gopego.com a technology and gadgetwebsite of Indonesia. In that, the malvert diverted visitors onto other malware dropping web-links to ultimately a CryptoWall downloading page -this malware encrypts the infected end-user's files followed with demanding $500 from the victim in Bitcoins for getting the decryption code which will let him regain the locked files. There's also a deadline of 168-hrs for paying the ransom failing which, the rate will double.

Chief Strategy Officer and Co-founder Dr. Fengmin Gong of Cyphort says that cyber-criminals while attacking networks typically hunt to discover that point on the network which poses the minimum resistance so that malvertising scams work to be bait for committing fraud as well as filching sensitive data from unwitting business organizations. According to him, the latest report hopefully will give an improved understanding of advertising malware to companies and individuals such as its process of happening, its frequency of occurring and the different measures for helping prevent it. Darkreading.com reported this, August 25, 2015.

Now, with malvertising problem here to stay and cyber-crooks continuously discovering tactics for monetizing their assaults, the Association of National Advertisers opine that global advertisers will lose over $6bn due to ad-fraud during 2015. And in future, Cyphort asserts, this figure will keep rising steeply.

Read more... - Malvertising Inciden...
 
Scammers Hack E-mail Account of Man in Ribble Valley PDF Print E-mail
Written by Administrator   
Thursday, 27 August 2015 09:00


An e-mail fraud that led to the hacking of the account of a man in Ribble Valley (Lancashire, England) has prompted police to investigate the incident, thus published clitheroeadvertiser.co.uk dated August 23, 2015.

According to complaints coming to officers from the family members of the man spread out in the country, they have got one electronic mail from a relation based at Ribble Valley.

By contacting that person through police, it was determined that he (the relative) was safe and all right.

Actually, when that person accessed the e-mail account in his name he found that someone had hacked it to send an e-mail to everybody on his contact list. The said e-mail purportedly from the person stated that he and his family was going through a terrible circumstance, because they were stranded inside Ukraine where robbers took away their cell-phones, credit cards and all cash. Presently, the family required the e-mail recipient's help by lending them 2,450 pounds so they can meet their hotel bills while also buy the plane tickets back home. The writer then asks what the recipient would be able to do in assistance.

But according to Ribble Valley Neighborhood Team's PC Tony Walsh, it's urged that recipients of the e-mail don't believe the scam. In case anyone does get the aforementioned message or one similar, he should talk to the person sending the e-mail, If establishing contact fails then he should talk to other relations, neighbors else friends for verifying the person, alternatively call 101 for police to get help. Whatever the situation, the scam e-mail must not be responded with transfer of money, Walsh explains. Clitheroeadvertiser.co.uk published this.

Meanwhile, in a similar fraud reported during mid-August 2015, hackers compromised Tony Carlisle charity boss' e-mail account and dispatched a plea message asking to lend money. The e-mail supposedly from Carlisle went out to 50,000 or more people whose addresses he had stored in his account. Asserting that Carlisle along with Nicola Greenan his partner got robbed when on vacation inside Turkey, the e-mail requested an urgent cash transfer of 1,650 pounds for paying hotel bills.

Read more... - Scammers Hack E-mail...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1307
Polls
The Spamproblem is
 
Who's online
We have 78 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us