Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Hacked Porn Site RedTube Results in Malware for Visitors PDF Print E-mail
Written by Administrator   
Friday, 27 February 2015 08:00

Malwarebytes the security company of late discovered an attack targeting the widely accessed porn website RedTube that receives 300m visitors on a monthly basis when the hack into the site diverted end-users onto one malevolent site that tried planting malicious software onto the visitors' PCs.

The security company stated that in January 2015 it disclosed one malvertising campaign targeting xHamster another adult website, whilst the malware served from the compromised let the attackers grab victims' private data.

Different from the xHamster malvert campaign, the RedTube hackers managed in penetrating the security of the infrastructure that hosted the porn site enabling them to plant one iFrame that end-users could not actually see.

Malwarebytes explains that the iFrame's existence inside the top web-page having source code sufficiently indicates that con artists hacked the servers of RedTube and acquired admission into the top web-page so they could introduce the malware onto it followed with letting loose the malicious code onto RedTube's visitors. published this in news on February 19, 2015.

Moreover according to Malwarebytes, the malware-laden site visitors were being diverted onto would utilize the more well-known Angler attack toolkit that's popular for getting employed during 0-day assaults vis-à-vis software such as Silverlight or Flash. Within the current case, Angler utilizes CVE-2015-0313 the more lately found Flash vulnerability. And when the toolkit manipulates the victim's Web-browser, it would try planting the Trojan namely Kazy., which substantiated the security breach, stated that when the company's security system instantly noticed the hack, it directly acted towards correcting the problem so RedTube visitors remained protected. The correction got completely done on the Sunday evening of 15th February 2015 and there wasn't anymore danger to accessing the website, RedTube emphasized. published this in news on February 18, 2015.

Thus, given the above situation, there should have been no infection starting the Sunday night and thereafter, but users who accessed the port site on the afternoon or evening same day required utilizing security software, Malwarebytes urged. This was particularly vital for users receiving pop-ups or diversions no matter if they were anticipated else otherwise.

Read more... - Hacked Porn Site Red...
Lenovo, a Computer Brand, Blamed for Shipping Laptops with Adware PDF Print E-mail
Written by Administrator   
Friday, 27 February 2015 08:00 reported on 19th February, 2015 stating that computer brand Lenovo has been shipping laptops which are pre-installed with malware causing these laptops more vulnerable to hackers and all have been done just for the sake of serving them advertisements.

Superfish, a company, made the software which is essentially an Internet browser add-on injecting ads into websites which they visit.

The add-on takes space in the Lenovo computer of the user and it is dangerous because it weakens the basic security protocols of the computer.

It happens because it damages a widely-used system of official website certificates. For example, it makes very difficult for the user's computer to recognize a fake website of a bank.

Customers began noticing this on their Lenovo computers in mid-2014.

Lenovo recently confessed the infection after facing vicious reactions of customers and security experts of computers.

For any comment, Selfish could not be contacted. Representatives of Lenovo said that they have acted upon the issue and confirmed that the tricky application was not found on all computers of users.

SecurityWeek published a report on 19th February, 2015 quoting Lenovo as saying "We detached Superfish from the new consumer systems during January 2015 and Superfish simultaneously disabled existing Lenovo machines in the market for deactivating Superfish. Superfish was preloaded only on limited number of models and hence Lenovo is comprehensively investigating the matter and any new problems raised due to Superfish."

SecurityWeek published a report on 19th February, 2015 quoting a noting of Mike Shaver, Engineering Director of Facebook, as "There are some users who reported in December which Superfish app had affected the usage of certificates of smart card.

Yonathan Klijnsma, IT Researcher of Fox, has managed to remove the private key of the Superfish certificate authority (CA) by reversing the engineering of the application and to try out passwords for the private key. SecurityWeek published news on 19th February, 2015 quoting the expert as saying "the password is related to the name which is internally used by Lenovo for Superfish."

You might have to reinstall a new fresh operating system to be secured completely. Security experts suggested that customers of Lenovo have already paid for Windows in their laptops and so they have to spend another $120 for a copy of Windows 8.1.

Read more... - Lenovo, a Computer B...
Co-Author of Blackshades Pleads Guilty in US Court PDF Print E-mail
Written by Administrator   
Thursday, 26 February 2015 08:00 reported on 18th February, 2015 stating that Alex Yucel, the co-author of Blackshades malware which infected more than a half-million computers all over the world pleaded guilty in Manhattan federal court on 18th February, 2015.

The federal investigator said that the Swedish citizen faces jail term up to 10 years with a fine and compensation amounting to thousands of dollars for his role in a scheme of distributing Blackshades to thousands of cybercriminals worldwide.

Conspirators installed remote Access Tool RAT of Blackshades on the computers of innocent users and ran the scheme from 2010 to 2013. The program costing $40 enabled crooks to access and see the files, photos and documents, record keystrokes, steal passwords and even they used the cameras of the machine to spy on users.

Users of Blackshades often sent electronic ransom notes to extract money from victims for releasing the computers from secret control. Prosecutors said that one such note warned: "Your computer has been hijacked and your private files in your computer has now been encrypted which means that they cannot be accessed and can be decrypted/restored only by us.

Yucel was arrested in November 2013 in Moldova and later extradited to the US. Prosecutors said that he ran the Blackshades organization under the name "marjinz".

Authorities said that the organization sold Blackshades RAT malware to thousands of users in more than 100 countries. Prosecutors said that Yucel employed paid administrators with a marking director and customer service representatives to boost his business and making BlackShades to generate sales of more than $350,000 by April 2014.

Yucel was charged of five counts according to the original indictment document in 2013 as conspiracy to commit hacking of computer, distribution of malicious software, conspiracy to commit access device fraud, identity theft and access device fraud.

Yucel is being held at the Metropolitan Correctional Center and he is scheduled to be sentenced on 22nd May, 2015 in U.S. District Court in Manhattan.

RAT co-creator Michael Hogue was arrested in 2012 and he was also facing sentence but he helped investigators in lieu of a part deal; Brendan Johnson, administrator of a Blackshades; and two customers as Kyle Fedorek and Marlen Rappa.

Read more... - Co-Author of Blacksh...
Experts Discovered Cyber Weapon Authored by French Hackers PDF Print E-mail
Written by Administrator   
Thursday, 26 February 2015 08:00 reported on 19th February, 2015 stating that security researchers analyzed and discovered that French hackers apparently developed a malware nicknamed 'Babar' as a cyber-weapon.

Edward Snowden leaked documents from Canadian Intel agency CSEC (Communications Security Establishment Canada) which first mentioned Babar referencing to an elephant. Le Monde (French daily evening newspaper) published these and later on Der Spiegel, a popular German weekly news magazine, published these with little redactions.

The malware was united with a spying exercise having a code name as Snowglobe which also spawned a apparently related Remote Access Trojan with a code name of EvilBunny. Canadian spies discovered in November 2009 that implants related to Snowglobe are more advanced than Babar itself.

The feature set of Babar includes clipboard logging, keystroke logging, screenshot snapping and more oddly, the prospect of logging audio conversations held via Yahoo or Skype. It can also inject code into running processes and steal files. Babar is a full-blown spying tool but it is not different on the whole from cybercrime tools like the family of Zeus banking Trojan.

The use of Tor to communicate and its other covertly features make Babar more advanced than common-or-garden cybercrime tools.

Security researchers find that the malware doing the spying contains two parts which are dropper and Trojan. published news on 19th February, 2015 quoting Marion Marschalek, malware Analyst of security firm Cyphort, as saying "Babar does not feature strong anti-analysis measures."

She analysis and says that it is not protected by a runtime packer or crypter and does not have sandbox detection or anti-debugging measures and most character strings are shown in clear-text.

Cyphort adds more information about the malicious tool showing two command and control (C&C) servers available in the configuration file. One of them is a genuine website of an Algerian travel agency which is currently online and the other is a Turkish domain presently displaying a banned access error (403).

The researchers did not make any attribution although the general opinion about Babar is that it is a product of a state-sponsored initiative and GDATA says that the "assertion of a 'French intelligence community' is responsible which remains unchanged.

Read more... - Experts Discovered C...
IRS Warns Taxpayers about Scam Emails PDF Print E-mail
Written by Administrator   
Thursday, 26 February 2015 08:00 reported on 19th February, 2015 stating that the IRS (Internal Revenue Service) or the taxing agency of US is announcing about a new online scam which is aimed at tax payers.

The agency (IRS) said that crooks are sending fake emails or phishing emails to tax payers asking them to update their information regarding IRS e-service portal and Electronic Identification Numbers (EFINs). With these kind of information, crooks can do lot of financial damage which may enable them to file fake tax returns and collect refunds meant for someone else. published a statement on 19th February, 2015 quoting John Koskinen, Commissioner of IRS, as saying "I request taxpayers to be careful while clicking on unknown emails and websites. They may be scam trying to steal your personal information."

IRS says that this is known as "Phishing" which is a scam actually carried out with unsolicited email or a fake website luring potential victims to provide valuable financial and personal information. A crook can steal identity and pile up charges on credit cards and may even can file false tax returns with these information.

If you receive such unsolicited email which seems to be from either IRS or an organization closely related to the IRS like Electronic Federal Tax Payment System (EFTPS) in the above discussed case, then please report it by sending the same to This e-mail address is being protected from spambots. You need JavaScript enabled to view it .

You may contact the Treasury inspector general for tax administration and visit and click on the link "IRS Impersonation Scam Reporting" on the home page. IRS advises to report about any suspected scams to the FTC by visiting and clicking on the link which says "Consumer Complaint".

Generally, IRS has added and strengthened the security in processing systems during this filing season to protect the taxpayers of the nation. However, IRS informs taxpayers that they are constantly progressing in stopping the identity theft and other fraudulent refunds.

It is important to remember that IRS never initiates any contact with taxpayers via email to ask financial or personal information including any type of electronic communication like text messages and via social media networks. The IRS has given online information which can help you to protect yourself from email scams.

Read more... - IRS Warns Taxpayers ...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1241
The Spamproblem is
Who's online
We have 26 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us