Blog Posts Tagged with "Crimeware"
July 04, 2012 Added by:Gregory Hale
The cloud-based control panel uses the secure HTTPS protocol and has a valid certificate. The customer has access to tutorials and a malware engine that generates customized Trojans in real-time. The team behind the service makes sure the created Trojans have a low rate of detection by major antivirus products...
July 03, 2012 Added by:Headlines
"With law enforcement hot on their heels, developers of the Citadel Trojan... dropped the bomb. The team’s spokesman declared that very soon their “software” will no longer be publicly available through the underground venues where the team has traditionally marketed and sold Citadel..."
May 31, 2012 Added by:Jorge Mieres
Despite being a package for criminal exploitation within a vast range of alternatives, it remains a real risk for any information system. Consider that the Hierarchy Exploit Pack in the criminal markets has reached a stage where it is found among the best crimeware available...
March 08, 2012 Added by:Brent Huston
Hacktivism is an extended threat for infosec. You can be targeted for your partnerships, role in a supply chain, to steal CPU cycles/storage from your systems, or because you have a common vulnerability. There are a myriad of reasons from the criminal to the abstract...
November 22, 2011 Added by:security curmudgeon
Most in the security industry frown upon botnet-for-hire operators that sell their stolen bandwidth for illicit purposes. Personally, while I don't like or agree with it, I understand it. They are no different than any other person selling questionable or illicit services or goods in our society...
August 30, 2011 Added by:Brent Huston
I was fascinated by this article that came across my newsfeed that said McAfee hit 65 million malware samples in the 2nd quarter of 2011. It seems that the malware cat truly is out of the bag. It also seems like someone forgot to warn the crimeware world about opening Pandora’s box...
June 30, 2011 Added by:Headlines
"The attack appears [to] focus on users of online banking services, especially small businesses and corporations. The messages are not well done. They are badly written and don’t really attempt to hide the fact that the attached file has the double extension .pdf.exe..."
May 11, 2011 Added by:Headlines
"With the source code in the wild it's likely we'll see an increase in attacks since lots of potential criminals might have been lacking both financials and trustworthiness to obtain their own license of this kit. Now being available as source code we'll likely see rebranding and modifications..."
January 18, 2011 Added by:Headlines
"The developer said the next combined version should be private (not released in an open forum) and with a price near US$4,000. Could this announcement be a scam? Of course, only when we discover a sample of this malware will we know for certain that it is now in the wild"...
January 14, 2011 Added by:Brent Huston
While we were all focused on the economy last year, the entire information security threatscape suddenly changed, under the watchful eyes of our security teams. To me, the overall effectiveness, capability and tenacity of both Zeus and Stuxnet is an Oppenheimer moment in information security...
January 11, 2011 Added by:Headlines
Security experts are warning that the substantial decline in spam over the last month may be just a lull before the storm. The simple truth is that crime does in fact pay, and as long as these groups have powerful botnets at their disposal, they will continue to seek the most profitable ways to utilize them...
November 28, 2010 Added by:Brent Huston
The capability and dependence on crimeware as an attack model is growing. The attacks from the next generations will have a much longer tail and will come in a series of waves and lulls, making detection more difficult and extending the time window of control for the attackers...
November 12, 2010 Added by:Headlines
When surfers are cruising the web for breaking news over their morning coffee, they now have a 22% chance of running into a website containing viruses and malware, an even greater chance than if they were searching online porn sites...
October 06, 2010 Added by:Jorge Mieres
In version 2.3 of PEK, there is a preliminary version 2.4 known as the 2.3r. Despite no visible differences, this version also upgrades a number of details in your code, and incorporates a number of exploits which currently represent a high success rate...
October 03, 2010 Added by:Jorge Mieres
The crimeware industry continues to grow through the development and implementation of new marketing packages, and pre-compiled exploits add to the supply of alternatives that facilitate criminal maneuvers over the Internet...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013