Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
BT Warns Customers of Phishing Email Campaign PDF Print E-mail
Written by Administrator   
Monday, 22 September 2014 07:00

Home.bt.com reported on 11th September, 2014 stating that a multinational British telecom company BT based in London has warned its patrons to be cautious about 'phishing' emails after receiving many phishing emails from them.

They received an email recently which tells the recipient that he requested termination of his BT account and his request is being processed by the company's Mail Team. It demands 3 days to close the BT account and in case a cancellation of the request is sought the recipient is told to click on a link to update his account information.

The phishing email also tells the recipient that all folders contained on his Mail account which includes Inbox, Sent, Trash, Spam and Draft would be thereby deleted and further access to his BT Account will not be possible.

The email thanks for choosing BT Telecom.

The email also reads to sound authentic as: "This is an automatic email, so please do not reply. To ensure future emails from BT are delivered to your inbox and not treated as spams please add This e-mail address is being protected from spambots. You need JavaScript enabled to view it to your address book. This email was sent to you at because you subscribe to BT Services."

BT says that it will investigate any phishing email which looks like coming from BT and it takes Internet security very seriously.

BT announces on its official website that if anyone clicks on the link in the email then he/she will be directed to www.bbc.co.uk instead of www.bt.com.

Experts have outlined many tips to avoid falling for this scam which include: firstly, Avoid clicking on links provided in scam emails like in the above scam. Secondly, do not furnish any information asked in the email like above case.

Moreover, BT.com says to forward any phishing email targeting BT to This e-mail address is being protected from spambots. You need JavaScript enabled to view it .

Also, scam emails should be deleted from the user's computer immediately.

However, if the user receives more information linked to an alleged phishing scam, he must visit the authentic website of the affected institution or directly contact the institution such as BT.com in the above case because the institution's website may give updated information about the phishing email which the user received.

Read more... - BT Warns Customers o...
 
Compromised Brazilian Website Used to Hack Routers at Home PDF Print E-mail
Written by Administrator   
Monday, 22 September 2014 07:00

Theregister.co.uk reported on 15th September, 2014 quoting Fioravante Souza, Security Researcher of web security outfit Sucuri, as saying "A well-known Brazilian newspaper namely, Politica Estadao, website has been hacked by attackers with malware which attacked home routers of readers."

Attackers fixed iFrames in the website of the daily which started brute force password guessing attacks against users as and when loaded.

Souza says that attackers intended to change the settings of DNS on hacked routers writing that "...the payload was undertaking the user admin, gvt, root and some other usernames with the default passwords of the router. The script is then used to find the local IP address of your computer and it begins to guess the router IP by passing it as a variable to another script. iFrames tried to change the configuration of DNS on DSL router of the victim by brute forcing the admin credentials."

The code of attack was manipulated to target Internet Explorer which attacked IP addresses on local network range of reader including '192.168.0.1' and '192.167.1.1'.

Souza analyzed and revealed that the concealed iFrame injection loads matter from laspeores (.)com(.ar.).Threatpost.com reported on 12th September, 2014 quoting Souza as saying "A second iFrame is consequently loaded and pulls matter from vv2(.)com, a URL shortener, and 3rd iFrame then loads with tainted JavaScript redirecting to a third website."

Hackers know very well that small business and home routers have shortcomings as most of them do not have sufficient fixing and have weak or default passwords.

Hence, an attacker can redirect router traffic and can conduct any number of bonus attacks putting credentials, banking, email and other kind of transactions at risk.

The number one distribution mechanism for malware has been Websites for a while which has been the evolution in attacks. It's not likely that this will end soon and hence you have to be vigilant ad prepared. You have to remember that your personal online security is as important as your website security.

Experts conclude that you should disable the execution of JavaScript on browsers or disable play options for objects in the browser to minimize such attacks.

Read more... - Compromised Brazilia...
 
Blackmailer of Bitcoins Pleads Guilty of his Crime PDF Print E-mail
Written by Administrator   
Saturday, 20 September 2014 19:00

Finextra.com reported during first week of September 2014 that a 22 year old hacker, Lewys Martin, has pleaded guilty of blackmailing by threatening to disclose the personal details of thousands of phished Lloyds bank accounts holders, unless he was paid a ransom of 270,000 Pounds in bitcoins.

In May 2013, Martin contacted Lloyds Bank threatening to disclose the personal details of 28,000 Lloyds Bank account holders to The Sun newspaper and demanded one bitcoin for every ten accounts that he was having on a memory card.

At the time of his arrest, Martin was found to be possessing 3 malware-based phishing programs for stealing the personal details and compromised banking data. Besides, many indecent photos of children were also found that were not related to this investigation of blackmailing.

Finextra.com reported during first week of September 2014 quoting Jason Tunn, Detective Chief Inspector of the Metropolitan Police Cyber Crime Unit, as saying "Martin could not break the bank's security systems but instead decided to target his phishing activity at retail customers. I would like to remind public to remain safe online and seek advice from GetSafeonline.org for more security and safety."

Martin started committing computer related offences from the age of 20 in 2012. He was jailed for 18 months for spreading a Trojan Horse posing as a popular Call of Duty computer game, which logged keystrokes and stole banking details and passwords.

According to the local news reports, he faced charges again in November 2012 for launching DDoS attacks on websites of Oxford and Cambridge University, as well as on the website of local Kent police force that had gone offline for more than an hour. He finally pleaded guilty to DDoS charges in April 2013, and was jailed for another 2 years in May 2013 by which time he seemed to be doing his next crime for which he was due for another sentence in December. All in all it's a story of gradually increasing crime. Presently, Martin is in custody, and will return to court for the sentencing on 16th October, 2014.

Read more... - Blackmailer of Bitco...
 
Microsoft Found Zemot, a Strain of the Infamous Upatre Malware PDF Print E-mail
Written by Administrator   
Saturday, 20 September 2014 19:00

Softpedia.com reported on 11th September, 2014 quoting Microsoft as saying "dropper of Zemot is a thread of the malware downloader, Upatre which benefits from different distribution points including both spam botnet as well as compromised websites."

Microsoft observed activity from TrojanDownloader: Win32/Upatre.B during late 2013 and found that cybercriminals preferred it to distribute two strains of click-fraud malicious software. These two strains have been accordingly named as PWS:Win32/Zbot.gen!AP and PWS:Zbot.CF), the software giant says.

In May 2014, Upatre.B was renamed as Zemot separate two threats which are similar in nature with certain different particulars which was enough to make them a new family of malware.

Zemot is a malware which is a part of a network having complex structure involving many kind of malware. Security researchers note that the malware is delivered to the PC of the user via exploit kits Nuclear Pack and Magnitude, or it can be circulated via spam-sending botnet as such as Kuluoz.

Once Zemot enters the system, it beings directing in click-fraud malware. However, Microsoft off-late observes many other types of threats which have been circulated (Rovnix, Viknok and Tesch) and can be used to download new malware or to steal sensitive information.

According to Microsoft, family of Zemot includes other important characteristics like using many techniques to ensure that the module which has been downloaded will be unbeaten on all Windows platform.

Besides this, Zemot has other features: major variants having different formats related to download file name and static configuration. Modules like getting the user privilege, OS version, routine downloading and URL parsing are picked from the source code of Zbot and variants can be tied up with other malwares (one Trojan downloader can circulate numerous malware payloads.)

This threat model is complex in nature which makes it important to ensure that your installed security software covers all part of infection chain consisting the downloaders which can otherwise create re-infection. The software giant also suggests that there are a whole lot of websites of software security available online which offer free versions of security tools which can be easily downloaded to remove Zemot from your machine.

Read more... - Microsoft Found Zemo...
 
Chinese Hacker Cabals Attempt Theft of Trade Secrets PDF Print E-mail
Written by Administrator   
Friday, 19 September 2014 09:00

According to FireEye the security company, a dual spying operation is going on by Chinese hackers who seek to steal trade secrets that countries in the neighborhood maintain.

Of these two hackers' cabals, one is called Moafee which spies on government and military, particularly, USA's defense sector, while the other is known as DragonOK which attacks manufacturing as well as high-tech organizations within Taiwan and Japan. Moreover, the groups operate from separate areas in China like DragonOK from Jiangsu Province and Moafee from Guandong Province both provinces in China.

FireEye's researchers state that the two groups distribute spear-phishing e-mails, with the messages well-crafted as well as sent to specific audience, while using the local language of the target Internauts. Attachments within the e-mails are like often zipped files alternatively password-protected MS files with executables embedded. It has also been seen that the spying cabals utilize decoy documents, which victims confront as the malware works behind the screen, according to the researchers. Securityweek.com published this dated September 11, 2014.

A backdoor malware is also employed in the espionage campaigns. This ranges from PoisonIvy to NewCT2, CT/NewCT, Nflog and Mongall. Both groups further append the well-known proxy device HTRAN to their C&C infrastructures for disguising the places of their operations.

The researchers observe that the groups during their operations do one of the following: coordinate activities; acquire identical training; use an identical toolkit supply sequence; make certain mixture of the just stated. According to them, the campaigns appear like one "production line" assault sequence.

And while not articulating the sort of information spied on, FireEye does emphasize that the hacker groups focused on the area's "abundant natural resources" viz. natural gas and oil under the South China Sea.

FireEye's researchers also state that perhaps a yet another Chinese hacker cabal armed with 'advanced persistent threat' (APT) is utilizing a few of the identical methods and toolkits which DragonOK and Moafee are using. Through the coordination of joint assaults and sharing of TTPs, these APT criminals, according to the researchers, are capitalizing on the economic expertise in China for carrying out large-scale global espionage.

Read more... - Chinese Hacker Cabal...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1185
Polls
The Spamproblem is
 
Who's online
We have 26 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us