Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Thursday, August 01, 2013
Summarizing Webroot's Threat Blog Posts for July
The following is a brief summary of all of my posts at Webroot's Threat Blog for July, 2013. You can subscribe to Webroot's Threat Blog RSS Feed, or follow me on Twitter:
01. Cybercriminals experiment with Tor-based C&C, ring-3-rootkit empowered, SPDY form grabbing malware bot
02. Deceptive ads targeting German users lead to the ‘W32/SomotoBetterInstaller’ Potentially Unwanted Application (PUA)
03. Newly launched underground market service harvests mobile phone numbers on demand
04. Novel ransomware tactic locks users’ PCs, demands that they participate in a survey to get the unlock code
05. Spamvertised ‘Export License/Invoice Copy’ themed emails lead to malware
06. Cybercriminals spamvertise tens of thousands of fake ‘Your Booking Reservation at Westminster Hotel’ themed emails, serve malware
07. New commercially available mass FTP-based proxy-supporting doorway/malicious script uploading application spotted in the wild
08. Fake ‘iGO4 Private Car Insurance Policy Amendment Certificate’ themed emails lead to malware
09. Tens of thousands of spamvertised emails lead to the Win32/PrimeCasino PUA (Potentially Unwanted Application)
10. Spamvertised ‘Vodafone U.K MMS ID/Fake Sage 50 Payroll’ themed emails lead to (identical) malware
11. New commercially available Web-based WordPress/Joomla brute-forcing tool spotted in the wild
12. Rogue ads targeting German users lead to Win32/InstallBrain PUA (Potentially Unwanted Application)
13. Yet another commercially available stealth Bitcoin/Litecoin mining tool spotted in the wild
14. Deceptive ‘Media Player Update’ ads expose users to the rogue ‘Video Downloader/Bundlore’ Potentially Unwanted Application (PUA)
15. Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities
16. Fake ‘Copy of Vodafone U.K Contract/Your Monthly Vodafone Bill is Ready/New MMS Received’ themed emails lead to malware
17. Rogue ads lead to the ‘Free Player’ Win32/Somoto Potentially Unwanted Application (PUA)
18. How much does it cost to buy one thousand Russian/Eastern European based malware-infected hosts?
19. Custom USB sticks bypassing Windows 7/8's AutoRun protection measure going mainstream
20. DIY commercially-available ‘automatic Web site hacking as a service’ spotted in the wild
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
No comments:
Post a Comment