Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Friday, August 30, 2013
Summarizing Webroot's Threat Blog Posts for August
The following is a brief summary of all of my posts at Webroot's Threat Blog for August, 2013. You can subscribe to Webroot's Threat Blog RSS Feed, or follow me on Twitter:
01. ‘Malware-infected hosts as stepping stones’ service offers access to hundreds of compromised U.S based hosts
02. New ‘Hacked shells as a service’ empowers cybercriminals with access to high page rank-ed Web sites
03. Fake ‘iPhone Picture Snapshot Message’ themed emails lead to malware
04. Malicious Bank of America (BofA) ‘Statement of Expenses’ themed emails lead to client-side exploits and malware
05. Cybercriminals spamvertise fake ‘O2 U.K MMS’ themed emails, serve malware
06. One-stop-shop for spammers offers DKIM-verified SMTP servers, harvested email databases and training to potential customers
07. Fake ‘Apple Store Gift Card’ themed emails serve client-side exploits and malware
08. Newly launched managed ‘malware dropping’ service spotted in the wild
09. Cybercrime-friendly underground traffic exchange helps facilitate fraudulent and malicious activity
10. From Vietnam with tens of millions of harvested emails, spam-ready SMTP servers and DIY spamming tools
11. DIY Craigslist email collecting tools empower spammers with access to fresh/valid email addresses
12. Bulletproof TDS/Doorways/Pharma/Spam/Warez hosting service operates in the open since 2009
13. DIY automatic cybercrime-friendly ‘redirectors generating’ service spotted in the wild
14. Cybercriminals offer spam-ready SMTP servers for rent/direct managed purchase
15. Cybercrime-friendly underground traffic exchanges help facilitate fraudulent and malicious activity – part two
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
No comments:
Post a Comment