Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Wednesday, May 01, 2013
Summarizing Webroot's Threat Blog Posts for April
The following is a brief summary of all of my posts at Webroot's Threat Blog for April, 2013. You can subscribe to Webroot's Threat Blog RSS Feed, or follow me on Twitter:
01. DIY Java-based RAT (Remote Access Tool) spotted in the wild
02. Spamvertised ‘Re: Changelog as promised’ themed emails lead to malware
03. Cybercrime-friendly service offers access to tens of thousands of compromised accounts
04. Madi/Mahdi/Flashback OS X connected malware spreading through Skype
05. Cybercriminals selling valid ‘business card’ data of company executives across multiple verticals
06. A peek inside the ‘Zerokit/0kit/ring0 bundle’ bootkit
07. DIY Skype ring flooder offered for sale
08. Spamvertised ‘Your order for helicopter for the weekend’ themed emails lead to malware
09. A peek inside a ‘life cycle aware’ underground market ad for a private keylogger
10. American Airlines ‘You can download your ticket’ themed emails lead to malware
11. Cybercriminals offer spam-friendly SMTP servers for rent
12. How mobile spammers verify the validity of harvested phone numbers – part two
13. A peek inside a (cracked) commercially available RAT (Remote Access Tool)
14. DIY Russian mobile number harvesting tool spotted in the wild
15. DIY SIP-based TDoS tool/number validity checker offered for sale
16. CAPTCHA-solving Russian email account registration tool helps facilitate cybercrime
17. Historical OSINT – The ‘Boston Marathon explosion’ and ‘Fertilizer plant explosion in Texas’ themed malware campaigns
18. Fake ‘DHL Delivery Report’ themed emails lead to malware
19. Cybercriminals impersonate Bank of America (BofA), serve malware
20. How fraudulent blackhat SEO monetizers apply Quality Assurance (QA) to their DIY doorway generators
21. Managed ‘Russian ransomware’ as a service spotted in the wild
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment