Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

Chinese Hacker Cabals Attempt Theft of Trade Secrets PDF Print E-mail
Written by Administrator   
Friday, 19 September 2014 09:00

According to FireEye the security company, a dual spying operation is going on by Chinese hackers who seek to steal trade secrets that countries in the neighborhood maintain.

Of these two hackers' cabals, one is called Moafee which spies on government and military, particularly, USA's defense sector, while the other is known as DragonOK which attacks manufacturing as well as high-tech organizations within Taiwan and Japan. Moreover, the groups operate from separate areas in China like DragonOK from Jiangsu Province and Moafee from Guandong Province both provinces in China.

FireEye's researchers state that the two groups distribute spear-phishing e-mails, with the messages well-crafted as well as sent to specific audience, while using the local language of the target Internauts. Attachments within the e-mails are like often zipped files alternatively password-protected MS files with executables embedded. It has also been seen that the spying cabals utilize decoy documents, which victims confront as the malware works behind the screen, according to the researchers. published this dated September 11, 2014.

A backdoor malware is also employed in the espionage campaigns. This ranges from PoisonIvy to NewCT2, CT/NewCT, Nflog and Mongall. Both groups further append the well-known proxy device HTRAN to their C&C infrastructures for disguising the places of their operations.

The researchers observe that the groups during their operations do one of the following: coordinate activities; acquire identical training; use an identical toolkit supply sequence; make certain mixture of the just stated. According to them, the campaigns appear like one "production line" assault sequence.

And while not articulating the sort of information spied on, FireEye does emphasize that the hacker groups focused on the area's "abundant natural resources" viz. natural gas and oil under the South China Sea.

FireEye's researchers also state that perhaps a yet another Chinese hacker cabal armed with 'advanced persistent threat' (APT) is utilizing a few of the identical methods and toolkits which DragonOK and Moafee are using. Through the coordination of joint assaults and sharing of TTPs, these APT criminals, according to the researchers, are capitalizing on the economic expertise in China for carrying out large-scale global espionage.

Read more... - Chinese Hacker Cabal...
Rev. Dyson Encounters Hacking of her E-mail PDF Print E-mail
Written by Administrator   
Friday, 19 September 2014 09:00

Rev. Beth Wheatley-Dyson belonging to Hanover, Massachusetts, USA situated St. Andrews Church expressed anguish when she learnt that her parishioners received unexpected e-mails from her account stating she was precariously stuck inside Turkey while facing dire trouble, reported, September 3, 2014.

The spurious e-mails stated that she required to be dispatched $2,600 immediately in order to enable her return to home, adding that her passport was being held pending the payment.

Actually, hackers had seized Dyson's e-mail A/C and used it to spam the fake messages to each and every address on her contact list.

The reverend said that the e-mail appeared really from her as it contained every bit of her information from the church.

It was the morning of 2nd September, 2014 when the problem began.

Rev. Dyson said that she received an e-mail from Yahoo which appeared as an official notification regarding certain appending done to her A/C.

However, she did not require any fresh account so she followed a given web-link with the intention towards disabling that account that nevertheless, resulted in the hack.

Soon, Dyson's brother rang up for telling that her e-mail was compromised. This was followed with her parishioners calling as also others like the Sheriff's office of Plymouth County (Massachusetts, USA).

The scam e-mail had such a form of writing that it could make Dyson's parishioners suspicious; however, there was also certain reference to St. Andrews' page on Facebook, in the e-mail, which also contained the church's website URL, as well as one telephone number of the nearby Hanover railway station.

Evidently, according to Dyson, she was concerned about the e-mail's mention of Turkey, since she journeyed to that country along with her husband 5-yrs back and her e-mail intruder possibly found references. Actually, says Dyson, she was in Alaska during the weekend following the Labor Day and not in Turkey.

Dyson further stated that she was trying getting her contacts to know she was ok; however, progress was sluggish as the hackers erased each and every of her e-mail contacts that left the reverend without knowing who were indeed the recipients of the scam e-mail.

Read more... - Rev. Dyson Encounter...
Hacker Dumps Around 5 Million Online Credentials of Google Account PDF Print E-mail
Written by Administrator   
Thursday, 18 September 2014 07:00 reported on 11th September, 2014 stating that a Russian hacker compromised near about 5 million accounts of Gmail and then published users' information in a text file on '', a well-known Russian Bitcoin Security board and leaked both usernames and their corresponding passwords.

Action Fraud, a help center run by London Police, which is a platform to register complaints regarding scams and online crime, notes that the hacking employed sending of bogus emails or phishing messages with links or some attachments by criminals.

These fraudulent emails persuade the recipient to click by convincing the recipient that they are from a genuine reliable source and some even employed recipient's personal details to reduce doubt on the mind of the recipient.

If the message contains a file as an attachment, then that it (that is, file) is probably tainted with malware which permits the attacker to infiltrate the hacker's device such as smartphone, computer or tablet. But if the link is clicked, the victim will be redirected to a bogus website where login or personal credentials may be asked.

However Google defended by saying that dumping of only small percentage of hacked combination of passwords and username would have allowed some hackers to access Gmail accounts.

The search giant (Google) confirmed that less than two percent of combos of email and passwords could actually be used for accessing Gmail accounts. published news on 11th September, 2014 quoting Google's spam and abuse team as saying that their automated anti-hijacking machines would have obstructed efforts of login and we have protected the affected accounts and requested those users to reset their passwords."

The company boasted about its strong security but users currently are not too convinced with these claims.

Meanwhile, Russian Internet forums recently dumped the large file of credentials which is the third one. Files containing the usernames and passwords for 4.7 million and 1.3 million Yandex accounts and two well known Russian Internet services were also recently leaked online. The news service stated that both companies have said that the files were common with obsolete, invalid and fake accounts.

Read more... - Hacker Dumps Around ...
Phishing Campaign Strikes University of Toledo PDF Print E-mail
Written by Administrator   
Thursday, 18 September 2014 07:00 reported on 10th September, 2014 stating that usage of the age-old technique of phishing by scammers are evolving and they have lately targeted the University of Toledo (UT) based in Toledo, Ohio, United States.

The latest form of social engineering or phishing seems to target both staff and students through email since last few months of 2014. reported on 10th September, 2014 quoting Dave Cutri, Director of Internal Audit, University of Toledo as saying "phishing scam can take multiple forms."

Cutri said that it can be defined as an email received by you from some stranger pretending to be someone you know but actually they are not.

Cutri said that they often pretend to be IT department claiming to upgrade and need your username and password to do the updates. reported on 10th September, 2014 quoting Matthew Junod, Information Security Officer and Manager of UT, as saying "often phishing scams related to UT are from overseas sources pretending to be from financial department or offering job."

Phishing scams are not new to Toledo or online world.

The University of Toledo claimed to have not requested personal information via email and advised to contact Help desk at X-2400 on all campuses in case of any problem with your email or UTAD account.

Cutri advises students of many ways of protecting themselves from phishing.

They include: Firstly, these emails may be common like "University Student" or "Email User" and sometimes with no greetings at all.

Secondly, you may see urgency in these emails with language used seeking immediate response without thinking.

Thirdly, if a user is able to identify a phishing email he is suggested to forward it to the University of Toledo IT Department and then delete them from their inbox.

Finally, it is not only University of Toledo which has fallen for phishing scams of late as during August 2014, the University of Memphis, Memphis, Tennessee, US, also became an unfortunate victim of phishing when several students received an email from the "help desk" asking them to click on a link and fill their online data to update their account.

Read more... - Phishing Campaign St...
Botnet Being Used to Malign More iCloud Security - Symantec PDF Print E-mail
Written by Administrator   
Wednesday, 17 September 2014 07:00

Symantec, a security vendor, confirms the news of iCloud users being targeted with a botnet after the theft of photos of celebrities from their accounts of iCloud and leaking them online.

Recently, there was a news of theft of nude photographs from the iCloud accounts of many female actresses and models by hackers and leaked some of them on public websites.

Symantec reported that the Kelihos, a renowned botnet is sending out bogus emails impersonating Apple informing users that they have bought the movie 'Lane Splitter' with their iTunes account with the help of a PC or some other device which was not connected with their Apple account before and urges them to give their ID details.

According to news published by on 8th September, 2014, the incident received so much media and online attention that CEO of Apple Tim Cook announced that the company will send security notifications to users via email and push messages whenever changes in iCloud account happen.

Symantec said that the timing of the assault may not be mere coincidence. The controllers of botnet could exploit public fears about security of Apple IDs to lure people to surrender their credentials.

Symantec noted that this isn't the first time Apple IDs have been attacked.

Symantec said that the botnet sent the email includes an IP address apparently situated in Volgograd, Russia which asserted to have been employed to make the claimed purchase.

Users are advised to use two-step authentication for their Apple ID accounts to prevent unauthorized access to their accounts even when their usernames and passwords are compromised.

Moreover, authors of Kelihos botnet are expert in exploiting current events. For example, in August 2014, they launched a spam campaign encouraging Russian-speaking users to install a program on their computers which could be used in distributed denial-of-service (DDoS) attacks against websites of Western governments in response to the recent international sanctions against Russia. Later the security firm revealed that the spam emails actually linked to a variant of Kelihos malware and not a DDoS program.

Read more... - Botnet Being Used to...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1185
The Spamproblem is
Who's online
We have 26 guests and 2 members online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us