Independent Contractor. Bitcoin: 15Zvie1j8CjSR52doVSZSjctCDSx3pDjKZ Email: dancho.danchev@hush.com OMEMO: ddanchev@conversations.im | OTR: danchodanchev@xmpp.jp | TOX ID: 2E6FCA35A18AA76B2CCE33B55404A796F077CADA56F38922A1988AA381AE617A15D3D3E3E6F1
Friday, November 01, 2013
Summarizing Webroot's Threat Blog Posts for October
The following is a brief summary of all of my posts at Webroot's Threat Blog for October, 2013. You can subscribe to Webroot's Threat Blog RSS Feed, or follow me on Twitter:
01. A peek inside a Blackhat SEO/cybercrime-friendly doorways management platform
02. Newly launched ‘HTTP-based botnet setup as a service’ empowers novice cybercriminals with bulletproof hosting capabilities – part two
03. ‘T-Mobile MMS message has arrived’ themed emails lead to malware
04. DDoS for hire vendor ‘vertically integrates’ starts offering TDoS attack capabilities
05. Commercially available Blackhat SEO enabled multi-third-party product licenses empowered VPSs spotted in the wild
06. New cybercrime-friendly iFrames-based E-shop for traffic spotted in the wild
07. Cybercriminals offer spam-friendly SMTP servers for rent – part two
08. Newly launched VDS-based cybercrime-friendly hosting provider helps facilitate fraudulent/malicious online activity
09. Fake ‘You have missed emails’ GMail themed emails lead to pharmaceutical scams
10. Compromised Turkish Government Web site leads to malware
11. Novice cyberciminals offer commercial access to five mini botnets
12. Spamvertised T-Mobile ‘Picture ID Type:MMS” themed emails lead to malware
13. Yet another Bitcoin accepting E-shop offering access to thousands of hacked PCs spotted in the wild
14. Malicious ‘FW: File’ themed emails lead to malware
15. Mass iframe injection campaign leads to Adobe Flash exploits
16. Rogue ads lead to the ‘Mipony Download Accelerator/FunMoods Toolbar’ PUA (Potentially Unwanted Application)
17. A peek inside the administration panel of a standardized E-shop for compromised accounts
18. U.K users targeted with fake ‘Confirming your Sky offer’ malware serving emails
19. New DIY compromised hosts/proxies syndicating tool spotted in the wild
20. Rogue ads lead to the ‘EzDownloaderpro’ PUA (Potentially Unwanted Application)
21. Fake ‘Scanned Image from a Xerox WorkCentre’ themed emails lead to malware
22. Fake ‘Important: Company Reports’ themed emails lead to malware
23. Cybercriminals release new commercially available Android/BlackBerry supporting mobile malware bot
24. Fake WhatsApp ‘Voice Message Notification/1 New Voicemail’ themed emails lead to malware
This post has been reproduced from Dancho Danchev's blog. Follow him on Twitter.
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment