Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Monday, April 01, 2013
Summarizing Webroot's Threat Blog Posts for March
The following is a brief summary of all of my posts at Webroot's Threat Blog for March, 2013. You can subscribe to Webroot's Threat Blog RSS Feed, or follow me on Twitter:
01. New DIY IRC-based DDoS bot spotted in the wild
02. Cybercriminals release new Java exploits centered exploit kit
03. Segmented Russian “spam leads” offered for sale
04. New DIY hacked email account content grabbing tool facilitates cyber espionage on a mass scale
05. New DIY unsigned malicious Java applet generating tool spotted in the wild
06. Commercial Steam ‘information harvester/mass group inviter’ could lead to targeted fraudulent campaigns
07. Fake BofA CashPro ‘Online Digital Certificate” themed emails lead to malware
08. Spamvertised BBB ‘Your Accreditation Terminated” themed emails lead to Black Hole Exploit Kit
09. New ZeuS source code based rootkit available for purchase on the underground market
10. Cybercriminals resume spamvertising ‘Re: Fwd: Wire Transfer’ themed emails, serve client-side exploits and malware
11. Cybercrime-friendly community branded HTTP/SMTP based keylogger spotted in the wild
12. Hacked PCs as ‘anonymization stepping-stones’ service operates in the open since 2004
13. Fake ‘CNN Breaking News Alerts’ themed emails lead to Black Hole Exploit Kit
14. Spotted: cybercriminals working on new Western Union based ‘money mule management’ script
15. Malicious ‘BBC Daily Email’ Cyprus bailout themed emails lead to Black Hole Exploit Kit
16. ‘ADP Payroll Invoice’ themed emails lead to malware
17. ‘Terminated Wire Transfer Notification/ACH File ID” themed malicious campaigns lead to Black Hole Exploit Kit
18. New DIY RDP-based botnet generating tool leaks in the wild
19. A peek inside the EgyPack Web malware exploitation kit
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment