Blog Posts Tagged with "Crimeware"

2dc39ef06d1ad53bea80d28b84f3aa7e

Cloud Coverage: Malware as a Service

July 04, 2012 Added by:Gregory Hale

The cloud-based control panel uses the secure HTTPS protocol and has a valid certificate. The customer has access to tutorials and a malware engine that generates customized Trojans in real-time. The team behind the service makes sure the created Trojans have a low rate of detection by major antivirus products...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Citadel Malware May Be Coming Off the Open Market

July 03, 2012 Added by:Headlines

"With law enforcement hot on their heels, developers of the Citadel Trojan... dropped the bomb. The team’s spokesman declared that very soon their “software” will no longer be publicly available through the underground venues where the team has traditionally marketed and sold Citadel..."

Comments  (0)

192a6e6df92a5ebd88de9b476fdd350d

Hierarchy Exploit Pack: New Crimeware for the Gangs

May 31, 2012 Added by:Jorge Mieres

Despite being a package for criminal exploitation within a vast range of alternatives, it remains a real risk for any information system. Consider that the Hierarchy Exploit Pack in the criminal markets has reached a stage where it is found among the best crimeware available...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

The Changing World of Information Security Compromises

March 08, 2012 Added by:Brent Huston

Hacktivism is an extended threat for infosec. You can be targeted for your partnerships, role in a supply chain, to steal CPU cycles/storage from your systems, or because you have a common vulnerability. There are a myriad of reasons from the criminal to the abstract...

Comments  (0)

B8b580348b4e717042d0e394ee072001

DDoS: The Message is Often Lost in the Noise

November 22, 2011 Added by:security curmudgeon

Most in the security industry frown upon botnet-for-hire operators that sell their stolen bandwidth for illicit purposes. Personally, while I don't like or agree with it, I understand it. They are no different than any other person selling questionable or illicit services or goods in our society...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

McAfee: 65 Million Malware Samples - That’s Just the Tip

August 30, 2011 Added by:Brent Huston

I was fascinated by this article that came across my newsfeed that said McAfee hit 65 million malware samples in the 2nd quarter of 2011. It seems that the malware cat truly is out of the bag. It also seems like someone forgot to warn the crimeware world about opening Pandora’s box...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal Reserve Spam Message Carries Zeus Payload

June 30, 2011 Added by:Headlines

"The attack appears [to] focus on users of online banking services, especially small businesses and corporations. The messages are not well done. They are badly written and don’t really attempt to hide the fact that the attached file has the double extension .pdf.exe..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Source Code for Zeus Crimeware Toolkit Disclosed

May 11, 2011 Added by:Headlines

"With the source code in the wild it's likely we'll see an increase in attacks since lots of potential criminals might have been lacking both financials and trustworthiness to obtain their own license of this kit. Now being available as source code we'll likely see rebranding and modifications..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Did Zeus-SpyEye Exploit Toolkit Hit the Black Market?

January 18, 2011 Added by:Headlines

"The developer said the next combined version should be private (not released in an open forum) and with a price near US$4,000. Could this announcement be a scam? Of course, only when we discover a sample of this malware will we know for certain that it is now in the wild"...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Welcome to the Post Zeus-Stuxnet World

January 14, 2011 Added by:Brent Huston

While we were all focused on the economy last year, the entire information security threatscape suddenly changed, under the watchful eyes of our security teams. To me, the overall effectiveness, capability and tenacity of both Zeus and Stuxnet is an Oppenheimer moment in information security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spammers Conceive New Attack Methods

January 11, 2011 Added by:Headlines

Security experts are warning that the substantial decline in spam over the last month may be just a lull before the storm. The simple truth is that crime does in fact pay, and as long as these groups have powerful botnets at their disposal, they will continue to seek the most profitable ways to utilize them...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Three Changes in Crimeware You Can Count On

November 28, 2010 Added by:Brent Huston

The capability and dependence on crimeware as an attack model is growing. The attacks from the next generations will have a much longer tail and will come in a series of waves and lulls, making detection more difficult and extending the time window of control for the attackers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Malicious Websites Increased More Than 110%

November 12, 2010 Added by:Headlines

When surfers are cruising the web for breaking news over their morning coffee, they now have a 22% chance of running into a website containing viruses and malware, an even greater chance than if they were searching online porn sites...

Comments  (0)

192a6e6df92a5ebd88de9b476fdd350d

Inside Phoenix Exploit's Kit v2.3

October 06, 2010 Added by:Jorge Mieres

In version 2.3 of PEK, there is a preliminary version 2.4 known as the 2.3r. Despite no visible differences, this version also upgrades a number of details in your code, and incorporates a number of exploits which currently represent a high success rate...

Comments  (1)

192a6e6df92a5ebd88de9b476fdd350d

Black Hole Exploits Kit: More Crimeware

October 03, 2010 Added by:Jorge Mieres

The crimeware industry continues to grow through the development and implementation of new marketing packages, and pre-compiled exploits add to the supply of alternatives that facilitate criminal maneuvers over the Internet...

Comments  (0)