malware

Bamital Botnet destroyed: Microsoft, Symantec victorious

Bamital Botnet destroyed: Microsoft, Symantec victorious

This week the Botnet known as Bamital has been reported dead by the two warriors that claim to have killed it: Symantec and Microsoft. This report shows that the death of said botnet will take down its abilities in full: hijacking search results galore being the main evil this Bamital creature was working with. Each time a user in the line of fire searched for something using search engines from whens they'd be sent to a malicious 3rd party site, having malware installed from that point.

Continue Reading

Three charged over “Gozi” computer virus

Three charged over “Gozi” computer virus

Three men involved in creating and distributing the "Gozi" virus that infected over one million computers worldwide have been officially charged today. The group's hack allowed them to steal millions of dollars from users over a five-year period, stealing passwords and various banking information, like credit card numbers and bank account information.

Continue Reading

Multiple power plant workstations slammed by malware

Multiple power plant workstations slammed by malware

According to the Homeland Security Department, multiple power plants in the United States were affected by malware during the beginning of October 2012. While details are relatively scarce, it was revealed that one of the power plants had been infected via a USB flash drive. The infection happened during a software update.

Continue Reading

Java tipped in Red October – may be Homeland Security’s hang-up

Java tipped in Red October – may be Homeland Security’s hang-up

Over the past several days, the US Department of Homeland Security has issued warnings against using Java due to newly discovered security weaknesses - today it's been tipped that the Red October cyberespionage attacks may have had their own Java iterations. The two have not been put together by the Israeli IT security firm Seculert, the group that today suggests Red October was implemented not just via email downloads and USB sticks, but through web-based Java exploits as well. Could that and Homeland Security's warning be timed both right here at this point in time together without any relation to one another?

Continue Reading

Operation Red October cyberattack detailed by Kaspersky Lab

Operation Red October cyberattack detailed by Kaspersky Lab

This week the Moscow-based antivirus company Kaspersky Lab has revealed details of a five year long campaign that apparently targeted diplomatic, governmental and scientific-research organizations across the former Soviet Union. This attack used software known as Operation Red October, aka Rocra, a piece of malware designed to locate and make copies of both encrypted and non-encrypted documents in a target's computer. This attack appears to have been spread across hundreds of victims since 2007 with an intent on gathering classified information as well as geopolitical intelligence.

Continue Reading

Batchwiper malware wipes disk partitions on Iranian computers

Batchwiper malware wipes disk partitions on Iranian computers

Iranian computer systems have been hit with another bout of damage, this time from the malware Batchwiper, which, as its name suggests, infects a computer and promptly proceeds to wipe its disk partitions and user profile directories. The attack is said to be simplistic and is designed to only wipe data on specific dates, with the next one being January 21. Thus far, how the malware is spreading to machines is unknown.

Continue Reading

Discovered Samsung Exynos exploit opens door to major malware problems

Discovered Samsung Exynos exploit opens door to major malware problems

It isn't that often we get to write about an exploit that is both awesome and horrible at the same time, but today we're doing just that. A user over at the XDA Developers Forum has gone searching through Samsung Exynos kernels and has found one whopper of an exploit. This exploits affects a number of Samsung-made devices, along with potentially any device using an Exynos 4412 or 4210 processor and Samsung kernels, so a lot of Android users should be on the look out this evening.

Continue Reading

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17