2010年8月22日 星期日

FW: Malware Blog news pickups: Aug 14-20, 2010


-------------------------------------------
寄件者: All of PH AV Technical Marketing
傳送日期: Monday, August 23, 2010 1:50:28 PM
收件者: Newsbank; Marketing Writers
副本: Jocelyn Racoma (AV-PH)
主旨: Malware Blog news pickups: Aug 14-20, 2010
自動依照規則轉寄


Daily Pageviews to blog posts picked up

 

 

14-Aug

15-Aug

16-Aug

17-Aug

18-Aug

19-Aug

20-Aug

Malware Blog

1,995

2,123

3,499

5,127

3,398

2,629

2,325

Spammers Target Facebook and Twitter at Once
by Gedrick Lacson

1

0

2

1

2

2

1

Certificate Snatching—ZeuS Copies Kaspersky’s Digital Signature
by Trend Micro Advanced Threats Researchers

16

11

25

14

7

14

9

Making a Million, Part One—Criminal Gangs, the Rogue Traffic Broker, and Stolen Clicks
by Feike Hacquebord

15

23

49

24

23

20

7

Bogus MSRT Leads to FAKEAV
by Jessa De La Torre

2

14

7

7

10

3

7

Underground Credit Card Processor Compromised
by Feike Hacquebord

101

153

513

206

63

41

27

 

Fake Windows MSRT Utilized For Spreading Scareware

SPAMfighter, DK – Aug 20

Researchers at security firm Trend Micro have detected a phony MSRT (Malicious Software Removal Tool), which displays the real icon belonging to the original application. State the researchers that the phony MSRT proliferates online by penetrating PCs via system vulnerabilities. Often, it infects users when they access a malevolent website.

 

Click Fraud Trojans - A Profitable Business

SPAMfighter, DK – Aug 18

Security experts at Trend Micro have discovered that click fraud conducted through medium-sized botnet is a profitable business that can earn millions of dollars on an annual basis. Researchers at 'Trend Micro' have recently studied the click fraud cybercriminal model and stated that a medium-size botnet could earn hackers millions of dollars every year.

 

Bug Bytes

Indian Express, IN – Aug 17

“Social networking sites have become an easy target for cybercriminals,” says Amit Nath, country manager Trend Micro India and SAARC region, adding that Trend Labs Researchers have received samples of Facebook and Twitter spam. “The mail, which poses as a Facebook notification message, uses adult-themed strings to lure users into opening the attachment,” says Nath. Once infected with the worm, the user’s personal information becomes accessible and it is possible to commit ID theft.

 

Hackers hunt hackers in credit card company compromise

ITPro, US – Aug 17

“There are assumptions that one of the people behind the credit card processor company also serves as one of the Fethard’s owners,” Feike Hacquebord, an advanced threat researcher at TrendLabs, reported in a blog post.

 

Cybercriminals Uneasy After Underground Payment Processor Breached

Softpedia, US – Aug 16

"Another conversation discussed Fethard, a payment service that allows anonymous payments to be made and that is often associated with money laundering and other cybercriminal activities," Feike Hacquebord, advanced threats researcher at Trend, notes.

 

Underground credit card clearing house hacked

The Register, UK – Aug 16

"In 2007, a large sum of money was stolen from Fethard’s funds. This has undoubtedly created problems for Fethard and has possibly pulled the mother company deeper into the cybercrime business," Trend Micro researcher Feike Hacquebord explains.

 

Cyber Criminals Use Zeus Variants To Snatch Certificates

SPAMfighter, DK – Aug 14

According to Trend Micro (a security firm), their researchers had noticed lots of suspicious files with a strange digital signature. While analyzing some samples of Zeus, Trend Micro discovered numerous other files with signature that appears to belong to another renowned security vendor, Kaspersky. The researchers at Trend Micro explained that the signature instantly grabbed their attention because that appeared to be signed by an authentic antivirus company called Kaspersky, as reported by The Tech Herald on August 5, 2010.

 

.

 

沒有留言: