Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Bitcoin Ransomware Virus Paralyzes Italian Councils PDF Print E-mail
Written by Administrator   
Friday, 31 October 2014 06:00

Coindesk.com reported on 22nd October, 2014 stating that computer files of Municipal council offices across Italy have been encrypted by a ransomware virus which is demanding payment in Bitcoin.

Corriere della Sera, one of the country's top newspapers, reported that dozens of local office employees are not able to pay bills, issue certificates or access server documents unless they give the digital ransom.

Presently the attacker's fee is 400 Euros worth of bitcoin and this amount is believed to double after three days.

The virus was launched from a location in St Petersburg, Russia and it spreads quickly through the system network of the council through phishing emails. Many are still at risk but some machines have been updated with antivirus software to block it successfully.

Once the malware enters into a victim's machine, it sends an ordinary looking .PDF file bearing an elongated series of characters to all links in their email address book.

On being examined closely, the file is actually found to be a malicious .exe program.

When the contact opens the program, it encrypts all photos, .PDF files and documents of Microsoft office on their server and machine making them useless.

When the block is enabled, a phony anti-virus prompts users to purchase decoding software along with step-by-step instructions necessary to complete the process and transiction. The scammers even included contact details of customer support for those who are not known to Bitcoins use.

Bitcoinvox.com published news on 23rd October, 2014 quoting Maria Grazia Mazzolari, a town clerk in Bussoleno, Turin (Italy), as saying "Even after paying the ransom, the hackers had the impudence to invite me to call them in case of any problems."

The stunt seems to be lucrative till now. Di.Fo.B, an Italian consultancy dealing with cybercrime, stated that the bitcoin addresses filed by attackers have received around $100000 from all victims during last 6 days.

Di.Fo.B also expects that this figure will go up because many targeted public offices are still not aware of the spread of this virus.

The consultancy added that this specific virus is a variant of the renowned CryptoLocker which is dubbed 'TorrentLocker'.

Read more... - Bitcoin Ransomware V...
 
Damballa in its Q3-2014 Report Reveals Surging of Malware Threat PDF Print E-mail
Written by Administrator   
Friday, 31 October 2014 06:00

Damballa, a threat protection specialist, has launched its report of threat protection for Q3-2014 revealing that the malicious software threat is continuously rising.

According to the report of last quarter (referring to Q3-2014) the blaring businesses experienced 138,000 incidents in a day which is 32% more than Q2-2014 with patrons experiencing 37% devices on an average per day.

However, there is some good information as there has been 40% drop in daily infections compared to prior quarter. This is because patrons employing technologies such as automatic incident detection to respond to threats and recognize true positives.

But the chief worry is a surge in point of sale malware because Damballa identified a 57% surge in Backoff infections from August-September and a 27% increase only in the month of September.

US government has reported that Backoff is a fresh breed of exceedingly targeted POS (point of sale) malware which has infected around 1,000 businesses.

In September 2014, Home Depot, a popular and renowned American retailer, said that the notorious malware has stolen payment information of around 56 million customers over a five month period. Unfortunately, Jimmy Johns, Dairy Queen and Kmart, a subsidiary of Sears, also reported of breaches carried out by cyber crooks.

Businesswire.com published news on 24th October, 2014 quoting the comment of Brian Foster, Chief Technical Officer of Damballa, on the findings of the latest report as: "Primarily, these figures illustrate that prevention control cannot stop infections by malware. POS malware and other sophisticated threats can and will infect and we simply cannot protect our network with tighter security walls. Hence security teams face trawling through a tsunami of procedures every day and hence correlating these manually to locate the true positives is just not feasible. Instead, organizations need to focus on building better intelligence to locate the real threats. Good news is that if you correlate evidence, then you can have significant impact on reduction of number of tainted devices within the network. We'd suggest businesses to be prepared, to move ahead by assuming that they will be hijacked and take practical measures to prepare for remedies."

Read more... - Damballa in its Q3-2...
 
Hackers Pretending to be WHO Distributing Ebola-Themed Spam Mails PDF Print E-mail
Written by Administrator   
Thursday, 30 October 2014 08:00

According to SpiderLabs a cyber-security band, hackers, pretending to be WHO (World Health Organization) a global health agency, have launched malware-laced spam mails targeting unwitting users as they're tricked with an Ebola pandemic fright so they'd view the malicious messages, published designtrend.com, October 26, 2014.

Displaying a header "Ebola Safety Tips-By WHO," the malicious e-mails tell how recipients can protect themselves against the lethal Ebola virus.

The e-mails display other headings too - "So Really, How Do You Get Ebola?" "What You Need To Know About The Deadly Ebola Outbreak," "The #1 Food Items You'll Need In An EBOLA Crisis," and "Is there ANY way to cure Ebola?"

SpiderLabs also cautions about the e-mails' writings which try convincing readers towards pulling down an attached file having anti-Ebola security measures.

So one sample message that SpiderLabs's blog shows tells that the information along with preventive measures catalogued within the attachment would assist the reader as well as people around him remain protected.

It elaborates there's one epidemic of Ebola as well as diseases of other kinds at the recipients' places about these users know nothing; therefore, they should download the WHO file to get extra info regarding the way they can remain protected against Ebola as also the other preventable illnesses. The message ends with 'We care.'

But, if anyone opens the e-mail, he would download one RAR file carrying software for letting the hackers gain admission into his PC as well as its data.

The loaded malicious program would further load a Remote Access Trojan namely DarkComet that most anti-virus solutions can't detect.

The Trojan solely impacts Windows systems and not Mac computers, as these don't allow RAR file hosting that could enable spam/malware dissemination.

Meanwhile, although the campaign seems as getting quite widespread, fortunately specialists haven't still confirmed if it's any full-time scam. However, given that usernames and passwords have lately leaked from different social media websites, authorities think they should caution people early on about such dubious electronic mails. They suggest that maintaining one's security system up-to-date, while avoiding viewing any electronic mail of the aforementioned type, is the best manner for remaining secure.

Read more... - Hackers Pretending t...
 
Phishing E-mails Targeting Customers of Alinea Restaurant, Warn Restaurant Owners PDF Print E-mail
Written by Administrator   
Thursday, 30 October 2014 08:00

Well-known restaurant Alinea Restaurant situated inside Chicago, US has warned its customers for being watchful about scam e-mails posing as communication from it, thus published thedailymeal.com dated October 20, 2014.

One particular Facebook post that Alinea made cautions about people pretending to be restaurant employees who're sending spam mails with a Facebook message that reads there are ticket openings reserved for Alinea customers. Subsequently, the scammers direct the victimized users for sending Moneygram funds or wire money for obtaining the night out eating reservations.

By practice, patrons of Alinea make reservations through one elaborate Internet ticketing arrangement wherein prospective diners purchase their preferred reservation hour in advance of many months. As per owners, there's a trend of utilizing bogus e-mail ids by the phishing A/Cs wherein the ids have a character off from the actual id of Alinea staff.

In one missive on Facebook, Nick Kokonas, co-owner and Grant Achatz informs guests that when anyone offers online tickets for customers to buy, usually they're genuine while Alinea encourages its patrons, who've Facebook accounts to ask for such tickets, but only after confirming their authenticity by communicating with the restaurant at This e-mail address is being protected from spambots. You need JavaScript enabled to view it . Subsequently, they should visit the option for ticket delivery by accessing Alinea's ticket website. Hitherto, the majority of customers have managed in determining the scammers while Alinea has done all that's possible for eradicating them. Still, there maybe a fraudulent, phishing e-mail reaching a customer, therefore one must act cautiously, the officials conclude.

Disturbingly, it's because of the aforementioned kinds of phishing scams that there's an increase in phishing online, remark security analysts examining the bogus electronic mails.

According to them, cyber-crooks dispatch such bogus electronic mails through spamming operations believing a few Internet-users would become convinced while get definitely ensnared with the messages.

Therefore, for avoiding the kind of absurd phishing attempts, the experts suggest perusing the e-mail writer's id and determining whether it matches with the mentioned writer; if not, the electronic mail isn't real i.e., it's a fake. Secondly, users must use high-quality anti-spam and anti-phishing solutions, which would detect scam messages, even before they land inside the mailbox.

Read more... - Phishing E-mails Tar...
 
Targeted Assault Costing Companies Huge, Says Kaspersky PDF Print E-mail
Written by Administrator   
Thursday, 30 October 2014 08:00

One fresh survey jointly by B2B International and Kaspersky Lab conducted over 3,900 IT personnel showed that a single successful targeted assault against an enterprise could cost a huge $2.54m whereas for a small-sized business it could be $84,000, so published mspmentor.net dated October 27, 2014.

The survey named "IT Security Risks Survey" for the current year (2014) reveals that 94% of business firms confronted one-or-more cyber-security hack during twelve months just gone by, while those confronting one-or-more targeted assault during the same period increased 3% over a 2013 survey.

Moreover as per the new study, targeted assaults' frequency by cyber-criminals changes with respect to the kind of business a company runs. Defense and government sector organizations confronted the maximum frequent targeted assaults. This is evident from 18% of those surveyed from such organizations reporting they encountered one-or-more targeted assaults.

Additional findings of the survey show that spam campaigns represented that external threat which was the maximum for organizations followed with PC-viruses, PC-worms, PC-Trojans as well as more malware, accounting for 61%, according to 64% of those surveyed. Another 38% respondents stated that they gave top priority to safeguarding their companies' confidential data from getting exposed, while 39% described targeted assaults as being the top priority for their organizations.

Researchers estimated that losses from a single hack averaged $720,000. A business firm, which encounters a data hack, in the greatest number loses information related to inside operations (43%), with client info (31%) as well as financial info (22%) following next.

Managing Director Chris Doggett for the North America Division of Kaspersky Lab bemoaned that although enterprises appeared as perceiving targeted assaults looming large on them, companies deploying an essentially strong safeguard mechanism counted frighteningly few. ZDNet.com published this, October 27, 2014.

Doggett explained that it was amply lucid from the survey findings how enterprises now perceived targeted assaults as a big threat capable of harming them. Further, given prominent breaches occurring frequently, it was crucial that all sized businesses made safeguard of their information technology structures the greatest priority issue, particularly considering that every successful targeted assault resulted in real damages, he suggested.

Read more... - Targeted Assault Cos...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1200
Polls
The Spamproblem is
 
Who's online
We have 21 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us