Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
An Old Man of Prescott Valley Loses More Than $8,700 in Scam Email PDF Print E-mail
Written by Administrator   
Tuesday, 29 July 2014 11:00 reported on 17th July, 2014 stating a warning by authorities after a man from Prescott Valley, Yavapai County, Arizona, US lost more than 8,700USD through a scam email involving a female who claimed to be stranded in Nigeria.

The Office of the Yavapai County Sheriff announced that the 64 year old victim was trying to help someone in need and electronically wired money on four different occasions.

The wife of the victim told deputies that she has just discovered the scam due to which her husband lost the money.

The man confessed that he got friendly with the "woman" from Nigeria through emails weeks before and never spoke to her as he was communicating through emails only.

The woman finally requested for money claiming that she has misplaced her passport, other personal belongings and money and hence got stranded in Nigeria.

Authorities reveal that the woman asked for money towards airfare and processing funds and in response the victim wired 1000USD to a request he received on 2nd July, 2014.

However, the victim sent more money on 5th and 6th July because the suspect kept on asking for more money. published news on 18th July, 2014 quoting Dwight D'Evelyn, Officer at the Yavapai County Sheriff Office, as saying that he (victim) wired 6,000USD to a Nigerian Bank on 10th July, 2014."

D'Evelyn said that when the victim was urged to wire 4,000USD next day, he told his spouse about the liaison and the money transfers and she at once informed the sheriff's office.

D'Evelyn said that they were embarrassed by the unfortunate incident but asked the Sheriff's Office to disclose their story so that others could be careful and avoid such scams.

D'Evelyn said that they have fixed income and so it would be very difficult to bear the loss.

D'Evelyn said that such scandals are hard to probe because suspects normally use public computers in countries where involvement of law enforcement in fraud cases is not frequent.

There has been very few success in prosecuting some cases during past with the help of Interpol and federal law enforcement.

Read more... - An Old Man of Presco...
Approximately 500m PCs become Tainted Worldwide Annually; FBI PDF Print E-mail
Written by Administrator   
Tuesday, 29 July 2014 11:00

According to Assistant Director Joseph Demarest of Cyber Division of Federal Bureau of Investigation, industrial figures indicate that because of botnets, U.S. victims suffered losses of more than $9bn, while Internet users worldwide suffered losses of more than $110bn. Every year infections taint about 500m PCs worldwide resulting in 18 victims at every second, he adds. Help Net Security published this dated July 17, 2014.

Further Demarest says that cyber-criminals' activities impact businesses, financial institutions, governments, universities, private citizens, defense contractors, and hospitals that are then exploited for launching DDoS assaults; utilized for spam and proxy operations, for distributing malware, clandestinely collecting intelligence, launching assaults on critical servers; as well as used as arsenals during campaigns surrounding ideologies.

Referring to botnet operators' malicious task of infecting and amassing users' PCs for building spam spewing networks, Demarest boasts of FBI's collaboration with private sector alliances and law enforcement that effectively disrupted huge botnets.

According to him, FBI has by now started developing new methodologies for aiding in lessening growing botnet assaults, however, contends that there must be more convergence of agencies of law enforcement with both private and public participants for tackling the problem.

Elsewhere Demarest states that in general, FBI focuses on eliminating, lessening and stopping online crime via identifying the highly prominent criminals and then dousing the threat. The Bureau's success, he says, is possible solely via coordination between all the present and upcoming agents of its Cyber Division. published this dated July 17, 2014.

And through the above collaborative process, Demarest states FBI plans for executing comprehensive and aggressive policies for the threat's mitigation to be attained via joint probes as well as partnering with law enforcement, academia, industry and private entities for necessary operations.

Here Demarest outlines their latest success in taking down the Gameover ZeuS by leading a global operation during June 2014.

However, the security industry wasn't much optimistic regarding the aftermath of Gameover ZeuS takedown. It warned that henceforth botnet herders could prepare more perilous assault techniques, and that proved right, July 11, 2014, the day Gameover ZeuS network showed up with a more resilient edition.

Read more... - Approximately 500m P...
Experts Warn that Users of iTunes being Targeted by Fresh Phishing Campaign PDF Print E-mail
Written by Administrator   
Tuesday, 29 July 2014 11:00 reported on 16th July, 2014 quoting a warning by security experts as 'spammers are presently running a campaign of phishing email targeting dupe users of iTunes software of giant Apple.'

The fake email entitled "Important message from Apple itunes!" reads:"dear Customer, Unfortunately, your online access has been blocked. It has come to our attention that your information is out of date. This requires you to verify this information for the restorer access to your account. The failure of this verification leads to the removal of your iTunes account. To verify your identity, follow the instructions below carefully."

The user is given the option of "Verify Now" in the fake email, in case he/she wants to activate his/her account instantly.

However, emails are not from Apple and cybercriminals get all information provided in response to the fake email. The fact is that Apple or any other organization does not send such emails to their customers as they never want to suspend or delete a customer's account because organizations actually would never like to lose customers.

They would send a message to users reminding them of their long absenteeism from their service if the service remains inactive.

Security experts spotted a phishing email of above type and analyzed it to detect its location of spoof website as Newark, New Jersey.

Security experts observe that this phishing email is easy to be detected because of its grammar mistakes in the poorly constructed message but others can be more successful.

Apple informs its customers through its official website that they should never provide their Apple information on any non-Apple website. Apple websites have like or (with the exception being which require Account information.

Apple suggests that if you receive a suspicious email of the above discussed type, then forward it to

Moreover, this is not the first time that Apple patrons have been attacked with Apple-themed phishing email scam because security pundits spotted a scam email during June end purporting to be from the software giant (Apple) and trying to cheat consumers with unexpected iWatch and iPhone 6.

Read more... - Experts Warn that Us...
PushDo Trojan Appears in Fresh Version, Says BitDefender PDF Print E-mail
Written by Administrator   
Tuesday, 29 July 2014 11:00

BitDefender recently detected one new variant of PushDo Trojan that uses a different encryption key during exchanging messages among the infected PCs of the botnet alternatively while communicating with the malware's C&C server, published, July 16, 2014.

While authors of PushDo developed several variants, BitDefender's security investigators have just discovered one fresh strain, which though uses the previous communication protocol, however, utilizes new keys for public/private encoding.

There's one more modification in the new PushDo variant i.e. it has one encrypted overlay in connection with the Trojan's binaries for certain validation. BitDefender's investigators elaborate this as the necessary requirements mentioned within the overlay which must be complied with otherwise the variant won't work properly. published this.

Apparently, each-and-every domain-name generated via an in-built DGA (domain generation algorithm) currently has approximately a hundred clean entries. All details related to the actual C&C (command-and control) infrastructure is hidden with this DGA, thus it becomes harder for disrupting the botnet.

Further, the PushDo authors are presently using one new DGA whose main structure though remains the same the domain-names it issues appear quite different, states BitDefender.

The security company sinkholed one such domain-name following which it was able in getting 8,840 queries associated with 2,336 distinct Internet Protocol address within not even three full hours.

Of the ten nation-states that were most affected with PushDo's latest variant were USA, Indonesia, India and Vietnam, where almost 600 contaminations were spotted.

The PC-Trojan, since its first appearance during 2007, is being repeatedly utilized for planting the SpyEye or ZeuS financial malware through spam.

As per BitDefender Labs' Senior E-Threat Analyst Bogdan Botezatu, cyber-criminals seemed as maintaining their efforts towards making the PushDo botnet up-to-date, but had not still distributed any fresh malicious program through Cutwail the spamming module of the botnet. published this, July 16, 2014.

Botezatu further said that PCs having the latest PushDo sample weren't thrusting anything yet, however, were attempting at making every client assign with the sample. According to estimations, PushDo infections hit 1.5m PCs globally and BitDefender anticipated all those PCs would get updated to PushDo's newest variant, he finished off.

Read more... - PushDo Trojan Appear...
‘Mayhem’ Proliferates through Web-Servers FreeBSD, Linux, State Experts PDF Print E-mail
Written by Administrator   
Monday, 28 July 2014 07:00

Security researchers have spotted one new malware that is named "Mayhem" as it proliferates through FreeBSD and Linux Web-servers, published dated July 18, 2014.

Security researchers Evgeny Sidorov, Konstantin Otrashkevich and Andrew Kovalev from Yandex, an Internet company in Russia, conducted a study of both the CnC (command-and-control) and client-side servers of Mayhem followed with writing a paper for Virus Bulletin.

According to them, a partial assessment of Mayhem that MalwareMustDie research team published during May 2014 reveals that the malware has various functions which are of one conventional bot for Windows; however, it's capable of operating even when rights to systems are restricted. published this, July 18, 2014.

The researchers explain that Mayhem gets spread in the form of PHP script that became detectable during mid-June by just 3 AV solutions on VirusTotal. Once on any PC, the threat starts interacting with its CnC server through responses and requests pertaining to HTTP POST.

In all, the researchers identified 7 CnC commands. Among the functions Mayhem performs are included informing about its successful installation onto the target PC to the server; requesting for files; transmitting data; as well as reporting about its condition. Conversely, the CnC instructs the bot to execute any fresh task, halt an ongoing one, transmit data, or plant plug-ins, the researchers disclose.

Also, being Modular, it's possible to expand Mayhem's functions via plug-ins; right now, researchers have uncovered eight -these include deciphering passwords of users surfing on Joomla or WordPress, through brute-force method; crawling websites for gathering information; locating certain RFI (remote file inclusion) security flaw as well as detailing Web-surfers of WordPress sites.

An assessment of the CnC servers regulating the botnet, aided the team effectively unearth certain statistical figures from two that in all regulated 1,400 contaminated servers.

Apparently, the countries having most infections comprise Canada, USA, Germany and Russia.

Mayhem peddlers haven't enabled the key computers' complete utilities, as they harbor other malicious elements too which hadn't gotten served to the infection spreading bots.

Technically, the researchers have discovered one plug-in, which abuses 'Heartbleed' one lately-spotted flaw, while garners data stored on attack-prone servers.

Read more... - ‘Mayhem’ Prolife...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1166
The Spamproblem is
Who's online
We have 20 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us