Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Iron County Alerts Residents about Fraudulent E-mails PDF Print E-mail
Written by Administrator   
Friday, 21 November 2014 06:00

The Utah, USA situated Iron County residents are being cautioned from their Sheriff's Office that a scam e-mail, currently in circulation, is targeting them, published stgeorgeutah.com dated November 13, 2014.

The Office, in one press release, informed that the fake electronic mail tells its recipient that there's one overdue arrest warrant on him related to a loan he didn't pay as well as committing of check fraud.

And though it may seem that some legitimate source sent the e-mail, according to the press statement, this isn't how the government would get in touch with anyone concerning any arrest warrant.

So if anybody gets such an e-mail which has one attached arrest warrant he should peruse the details given towards determining inconsistencies.

The inconsistencies may include information regarding a different state's attorney alternatively any telephone number which isn't valid alternatively goes to some non-government person/office else some Magic Jack telephone-number.

One more indication the e-mail is a fake follows from the receiver actually not having any unpaid loan like claimed within the message. Moreover, the warrant's items seem as being copied. Overall, the e-mail uses a scare trick for extracting cash from unwitting users.

Ultimately, anybody getting one false arrest warrant requires informing Federal Bureau of Investigation (FBI) alternatively his district's United State Marshals Office. However, incase the recipient of the warrant doubts the order's genuineness he should talk to his district court's junior employee. It's reported that the bogus detention order e-mails are spreading all over US, including within various District Courts such as those of Illinois, Ohio, Kentucky, New Mexico, Columbia, Utah, as well as all over Florida.

As per investigating officers, any individual acquiring or demanding cash else any other valuable thing by pretending to be any employee/officer of US could face monetary penalty and/or a maximum of 3-yrs imprisonment.

Now, it isn't merely Iron County's residents getting targeted with bogus detention order scam e-mails. Recently two months ago (September 2014), e-mail fraudsters pretending to be court officials and police officers tried duping Alaskans so they would frighteningly hand over money as fines for eschewing imprisonment, as per one notice which Alaska's courts released.

Read more... - Iron County Alerts R...
 
Trend Micro Observe that Keyloggers Being Used More by Cybercriminals PDF Print E-mail
Written by Administrator   
Friday, 21 November 2014 06:00

Security firm Trend Micro recently released a research paper that throws light on keyloggers, deceitful but still efficient tools which cybercriminals are increasingly employing these days.

Ryan Flores, Senior Threat Researcher of Trend Micro said that bulks of these tools are "simple, off-the-shell" offerings which are used to undertake email fraud in corporations on a massive scale.

The rising price of these threat landscapes can differ but in the grey markets, low cost malware is available to guarantee that cybercriminals gain ample benefit.

Security researchers, experts and analysts know that these malicious codes can cause huge losses when in wrong hands, and thus help scammers make huge profits.

Researchers of Trend Micro reveal that these RAT/keyloggers are available for 40 USD or less and they discovered a surprising reality about keyloggers dubbed 'Limitless' and 'Predator Pain' after a short period of time.

These keyloggers are low-priced but they hold the same capabilities that they discovered in other data-stealing malware.

Commercial Crime Bureau of Hong Kong Police Force estimated that they (referring to Limitless and Predator Pain keyloggers) are commanded by cybercriminals targeting small and medium-sized businesses (SMBs) in Hong Kong netted them $75 million during first half of this year alone and this is alarming as compared to the economic impact of malware like Zeus Botnet.

HELP NET SECURITY PUBLISHED A REPORT ON 12TH November, 2014 quoting Flores as saying "Consider: this means that cybercriminals in a single city equaled all losses from Zbot up to the present within six-months."

Flores added "They arbitrarily steal client's mail credentials and web credentials to capture keystrokes and screen captures. The output is readable which is good if you are managing only few infected machines but the design doesn't scale well when there are more infected logs and systems involved."

The attackers have selected to invest more time and effort instead of opting for more pricy, automated malware and they have succeeded also.

Researchers noted that attackers, after gaining access to infected computers and credentials in these, sit on a gold mine of information which they can use for various criminal and fraudulent activities.

Read more... - Trend Micro Observe ...
 
Human Rights Organizations under Pressure from Cyber-Assaults PDF Print E-mail
Written by Administrator   
Thursday, 20 November 2014 08:00

Think Tank Citizen Lab, of Canada which operates under the Munk School of Global Affairs of University-of-Toronto recently released a report that states how human rights activists have been subjected to cyber-attacks employing APTs (advanced persistent threats) that quite similarly strike public and government sector organizations, published cbronline.com, November 11, 2014.

Research conductors at Citizen Lab caution how civil rights enthusiasts have even less provisions compared to governments and corporations in tackling cyber-security and how these assaults can endanger democracy and people's rights.

Human rights activities characteristically neither possess the funding required for buying the services of technical security professionals nor have scope for getting government support in maintenance of digital protection alternatively have general policy with which their confidentiality as well as security can be safeguarded.

The research spanning four years covered ten separate organizations. With its results, Citizen Lab found how prominent cyber-attacks struck human rights gatherings in the same severe manner as they struck governments and industries. These cyber-attacks were like an alleged spying campaign from China named APT1 as also one more alleged Chinese campaign, NetTraveler.

For executing the assaults, considerable resources were used even as hackers deceitfully made the activists load malicious software onto their PCs.

There wasn't any requirement of high-tech cyber-weapons as the hackers knew their target organizations' defenses were truly feeble. The assaults worked out fine with well-designed socially-engineered phishing tactics like pretending to be fund providers, or pretending to be other activists belonging to alliance organizations.

Evidently, hackers receiving support of the People's Liberation Army (Unit 61398) of China targeted a Tibetan organization as also compromised a civil activist group. Mandiant an American cyber-security firm first identified this military unit.

Senior Researcher Nart Villeneuve of FireEye Inc. that of late acquired Mandiant said the hackers were capable of equipping themselves to attack inadequately-defended targets while progressively move towards targets that were adequately-defended big firms. Investing.com published this, November 11, 2014.

Finally according to the report, getting potential victims to click infected files proved far greater relevance than being technically advanced. Assaults concentrated on particular entities, remained for certain time-periods, and benefited from political motivation.

Read more... - Human Rights Organiz...
 
Law Enforcement Officials Arrest Man Operating Silk Road 2.0 PDF Print E-mail
Written by Administrator   
Thursday, 20 November 2014 08:00

Agencies of law enforcement have detained Blake Benthall in San Francisco because the man, aged 26-yrs, allegedly owned Silk Road 2.0 a market of illicit nature running under unidentifiable Tor network, published softpedia.com dated November 7, 2014.

Among different rivals, Benthall's market happened to be the biggest accessible on Darknet. It provided many different types of drugs as well as malware along with tools to launch PC-hacks; the tools being RATs (remote access tools), keyloggers and info-stealers, while supplied bogus documents too.

Referred to as "Defcon" on the Internet, Benthall understandably established Silk Road 2.0 so he could revive the original underground market also called Silk Road, which the officials had seized in 2013.

Reportedly, an agent of Homeland Security managed in gaining admission into Silk Road 2.0 from where he managed to do tasks in customer support and creation pertaining to the website. In the beginning, there was invitation for visiting the forum followed with the undercover entity getting administrator privileges. Soon, a server based within some unspecified foreign country allegedly started harboring Silk Road 2.0. But in that country, authorities managed in tracking the server followed with analyzing its data via forensic experts, which resulted in the detention as also dismantling of the website.

Responding to the above kind of underground markets, Preet Bharara, U.S. Attorney of Manhattan stated that anybody thinking about doing like the alleged online crooks must know that authorities would come back every time, if necessary, for shutting down harmful Internet crime markets without at all getting tired. Softpedia.com published this.

Incidentally, Benthall is accused of conniving towards carrying out narcotics trafficking in one instance that merits sentence of up to imprisonment for life along with one necessary least period 10-yrs imprisonment. Moreover, there's accusation he connived towards carrying out PC-hacking in one instance meriting a 5-yrs of imprisonment at the most; connived towards distributing fake identification documents in one instance that merits 15-yrs of imprisonment; while connived to do money laundering meriting imprisonment of 20-yrs.

For investigation into Benthall's case, law enforcement agencies of countries Germany, France, Britain, Holland and Lithuania have also been engaged.

Read more... - Law Enforcement Offi...
 
Cyber-Criminals Using Codes/Methodologies Typical in APT Assaults, Says Sophos PDF Print E-mail
Written by Administrator   
Wednesday, 19 November 2014 12:00

One new threat scam, which Sophos the security company has named "Rotten Tomato," indicates how ordinary hackers currently use codes and methodologies that are typical of APT (advanced persistent threat) scams. Infosecurity-magazine.com reported this dated November 7, 2014.

Sophos' label for the assault gets the name from an earlier campaign called 'Tomato Garden' wherein many separate hacker cabals utilized the identical 0-day vulnerability in Microsoft Word; however, the current instance is different in that a few samples haven't been effectively executed hence they're 'rotten.'

The attackers haven't just utilized the long prevalent CVE-2012-0158 security flaw, nevertheless, have utilized the more recent CVE-2014-1761 vulnerability too, abusing these for planting the Zbot Trojan.

According to Gabor Szappanos, Researcher with SophosLabs, Rotten Tomato represents one true personalized attack campaign, executed across Russia, during most of the instances. Infosecurity-magazine.com reported this dated November 7, 2014.

Rotten Tomato, which belongs to the Plugx malware group, was created to be one dual weapon assault where though, one weapon proved unsuccessful. Despite that, there still is real threat from the malware even as it raises the possibility of contamination inside computers within which previous flaws are already patched, stresses the security company.

Szappanos has been watching Plugx since the last 2-yrs and based on this malware variants' evolution during that period, the researcher lately issued one study paper, which explains the details of the campaign, and thereby reports how plentiful variants had been noticed which exploited the security flaws referred to above.

In addition, Szappanos states that these malware developers happen to be highly active APT gangs and they've been executing several personalized assaults which probably enjoyed the China government's backing. Scmagazime.com published this dated November 3, 2014.

According to the researcher, a variant called SHA1: c3a7cb43ec13299b758cb8ca25eace71329939f7 features one encoded Zbot sample3 prefixed to the RTF, while he bets the various malware developers utilized the variant like a template.

Szappanos further observes that while ordinary developers of malicious software copy APTs more and more, the fine line that separates ordinary malware assaults and APTs is getting more difficult for outlining. SCMagazineUK.com published this dated November 5, 2014.

Read more... - Cyber-Criminals Usin...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1207
Polls
The Spamproblem is
 
Who's online
We have 22 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us