Malware

SpyEye trojan developer and marketer extradited to U.S. to face charges

SpyEye trojan developer and marketer extradited to U.S. to face charges By

One of the masterminds behind the pernicious SpyEye banking trojan has been extradited to the United States, where he will face charges for computer and wire fraud.

U.S. Department of Labor web page serves watering hole attack

By

According to reports, the compromised page, for the Site Exposure Matrices (SEM), has been cleaned, but it remains offline.

Debate: Is advanced malware no longer a problem when administrator rights are removed?

In this month's debate, experts discuss if advanced malware is still a persistent challenge after administrator rights are removed.

Threat of the month: pdf.exe.zip files

Threat of the month: pdf.exe.zip files

For our May issue's "threat of the month," we focused on pdf.exe.zip files, an old-style email executable attachment attack.

New Ramnit variant seeks to evade two-factor authentication

By

The trojan carries out a one-time password scam. Researchers who studied the new malware strain, affecting U.K. bank customers, said they are fascinated by the attention to detail the fraudsters applied to the ruse.

Travnet trojan compresses files to send more info to data thieves

By

The Travnet botnet uploads Microsoft Office files, PDFs and text files to remote servers run by attackers.

New Java exploit on the loose following recent security update

New Java exploit on the loose following recent security update By

In addition to the exploit, which leverages a recently patched bug, a researcher has discovered a fresh vulnerability in the newly minted version of Java SE.

Latest Gozi trojan variant comes packaged with rootkit

By

Despite the arrests of Gozi ringleaders, the banking trojan still persists and is behind thousands of new infections in the United States.

BadNews infections in Google Play spread premium-rate SMS trojan

By

Attackers wanting to compromise apps in Google's official store leveraged an advertising network to foist their malware to unsuspecting victims.

New BlackHole email campaign found

By

Spam campaigns are sending out spurious emails purported to be from Facebook, LinkedIn, American Airlines and financial institutions, McAfee researchers found.

Threats from the web becoming more prevalent than network worms

By

Client-side, web-based threats are beginning to overtake malware mainstays such as Conficker, according to a Microsoft report.

Trojan uses "magic" code to infect organizations around globe

By

A trojan that uses a "magical" authentication code to communicate with its command-and-control server has compromised thousands of organizations around the globe. So far, however, it has remained largely silent.

Boston Marathon blasts breed malware ruses, surge in dubious websites

By

As expected, the web's unscrupulous element is taking advantage of the attention surrounding the Boston Marathon bombings to spread malware and trick people into donating to fake causes.

"Watering hole" websites present largest innovation for targeted attacks

By

Symantec's annual "Internet Security Threat Report 2013" concentrated on the success attackers are attaining by sabotaging legitimate websites.

Study: Bing delivers five times as many infected sites as Google

By

German research institute AV-TEST conducted the study over a period of 18 months.

Researcher demonstrates Android app that could hack airplanes

Researcher demonstrates Android app that could hack airplanes

The "PlaneSploit" application was three years in the making, and is able to remotely attack flight management systems, though the program was built to only work on virtual aircraft.

Bitcoin mining botnet has become one of the most prevalent cyber threats

Bitcoin mining botnet has become one of the most prevalent cyber threats By

Fortinet researchers have tracked 100,000 new ZeroAccess trojan infections per week, making the botnet very lucrative to its owners.

Android trojan spreads through Cutwail spam botnet

By

Attackers use phishing emails, which include links to a fake Adobe Flash update, to lure victims into installing the Stels trojan.

Roughly 20 charged in Eastern Europe with building Carberp banking trojan

By

Law enforcement in Russian and Ukraine have dealt a major blow to a prolific banking malware operation.

Malware tries to invade technology companies once every 60 seconds

Malware tries to invade technology companies once every 60 seconds By

No matter the industry, organizations are facing a flurry of sophisticated attacks, with the main goal being to hijack intellectual property, according to new findings from security firm FireEye.

Android malware targeting Tibetans has state-sponsored fingerprints

By

New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.

Cyber war, this is not

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network By

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

New study finds malware variants skirting AV, mostly delivered via web

New study finds malware variants skirting AV, mostly delivered via web By

As the debate on the usefulness of anti-virus continues, recent research reveals that a majority of malware is delivered via web browsing, skirting AV along the way.

Spear phishes used to infect South Korean corporate networks

By

Security researchers have found evidence that, not surprisingly, social engineering tactics were leveraged by the attackers, who set their malware to "go off" three days after reaching victims.

VSkimmer trojan steals card data on point-of-sale systems

VSkimmer trojan steals card data on point-of-sale systems By

The trojan was recently a topic of discussion on an underground Russian forum, researchers found.

Yontoo adware used to cash in on clicks targets Mac and Windows users

By

Saboteurs are spreading the Yontoo trojan, which infects computers so they display certain advertisements to infected users.

South Korean corporations hit by widespread attack that wiped data and shut down systems

By

Researchers at Symantec believe a trojan called "Jokra" was used in the attacks. Neighboring North Korea is considered a suspect, but there's no evidence suggesting it is to blame.

Malware places personal info of 25k at Massachusetts university at risk

By

A worm detected on a school server at Salem State University caused a breach.

Small businesses in crosshairs of new malware-laden email ruse

By

The Federal Trade Commission and the Better Business Bureau are alerting businesses about the new threat.

Advertisement

How to Prevent Insider Threats!

POLL