Blog Posts Tagged with "trojan"
September 21, 2013 Added by:Tripwire Inc
A year or so ago I stumbled upon a way to create Trojans for OS X by utilizing homoglyphs and a bit of social engineering, I disclosed the vulnerability to Apple and presented it at ToorCamp.
July 02, 2013 Added by:Tripwire Inc
Carberp is sophisticated, modular and persistent malware utilizing advanced obfuscation techniques to evade detection, removal and the ability to disable anti-virus. It also offers malware developers the ability to customize the malicious package statically as well as dynamically via a remote command and control server.
July 19, 2012 Added by:Headlines
“The concern with ZeroAccess is that it is using the subscriber’s bandwidth maliciously which will cost them money as they exceed bandwidth caps. And, once the computer is compromised, it can also spread additional malware or launch new attacks... while connecting to over one million computers globally..."
July 09, 2012 Added by:Pierluigi Paganini
Despite the calls to check for infected units provided by the press and law enforcement, too many PCs are still infected and potentially vulnerable to the planned blackout. The estimation is that 64,000 users in the United States, plus an additional 200,000 users outside the United States are still at risk...
July 03, 2012 Added by:Headlines
"With law enforcement hot on their heels, developers of the Citadel Trojan... dropped the bomb. The team’s spokesman declared that very soon their “software” will no longer be publicly available through the underground venues where the team has traditionally marketed and sold Citadel..."
June 28, 2012 Added by:Headlines
"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."
May 29, 2012 Added by:Jeffrey Carr
I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...
May 29, 2012 Added by:Kevin McAleavey
Flame is huge - 20 modules and 20 megabytes. Strange that the infector is an ActiveX control in the form of an OCX (OLE Control Extensions) file which apparently has run completely undetected for years. The worm runs as a Windows service, and most of the files are visible, making this even more of a surprise...
May 29, 2012 Added by:Headlines
"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."
May 21, 2012 Added by:Bill Gerneglia
As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...
May 14, 2012 Added by:Headlines
Symantec researchers reverse engineered components of the Flashback malware that recently infected more than 600,000 Mac systems and reveal that it was designed in part as a highly profitable ad-clicking operation that could be net the Trojan's creators $10,000 per day...
April 27, 2012 Added by:Headlines
"If the threat is running on a Mac operating system, it downloads a dropper type malware written in Python. However, if the threat is running on a Windows operating system, it downloads a standard Windows executable file dropper. Both droppers drop a Trojan horse program..."
April 26, 2012 Added by:Headlines
Another Flashback Trojan malware variant has been discovered, and this one is even more insidious than those already identified - it can silently infect a Mac user's device. Flashback.S can stealthily infect a system without having tipped the victim off by requesting a password...
March 26, 2012 Added by:Headlines
"With this legal and technical action, a number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization..."
March 20, 2012 Added by:Headlines
Symantec reports the discovery of a previously unseen driver (mcd9×86.sys) for Duqu that was apparently compiled as recently as February of this year, giving reason to believe the malware is very much alive and kicking...
March 15, 2012 Added by:Kevin McAleavey
Since Sabu's arrest a number of spurious lulz cannon tools have been interspersed in tweets, including the infamous LOIC, others containing added "call home" code, and some virused booty culminating in the latest release of "Anonymous OS" which is wrapped in trojans...
Mobile Security Processes Could Be Applied t... usman ali on 03-02-2015
Steps Toward Weaponizing the Android Platfor... usman ali on 03-02-2015
Education Sector is Failing Security... Filipe Mark on 03-02-2015