Virus News

July 27th, 2009

Welcome to our RSS – Virus and Spyware Related News Feed section. This page might take some time loading up as it has to extract and load data from other sources.

Microsoft – Security at Home

PCAdvisor – Security News

Computerworld – Viruses News

Kaspersky – Virus News

Norton Security Articles

Trend Micro malware Blog

  • Understanding Motivations and Methods of Web Defacement -

    Cybercrime takes on many forms, but one of the long-standing tactics attackers use is web defacement – the process of compromising and vandalizing a website. Typically, these attackers – known as web defacers – replace the original page with their own version, boldly stating a political or social message. This is not a new phenomenon, but it is an enduring one. The data we’ve analyzed goes back almost two decades, and we’ve seen how the process of web defacement is still being used nowadays.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    Understanding Motivations and Methods of Web Defacement

  • Struts and DotNetNuke Server Exploits Used For Cryptocurrency Mining -

    Threat actors have turned to cryptocurrency mining as a reliable way to make a profit in recent months. Cryptocurrency miners use the computing power of end users to mine coins of various kinds, most commonly via malware or compromised websites. By compromising servers in order to run cryptocurrency miners, the threat actors would gain access to more computing power and increase their profits from illicit mining.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    Struts and DotNetNuke Server Exploits Used For Cryptocurrency Mining

  • GhostTeam Adware can Steal Facebook Credentials -

    We uncovered a total of 53 apps on Google Play that can steal Facebook accounts and surreptitiously push ads. Many of these apps, which were published as early as April 2017, seemed to have been put out on Google Play in a wave. Detected by Trend Micro as ANDROIDOS_GHOSTTEAM, many of the samples we analyzed are in Vietnamese, including their descriptions on Google Play.

    Their command-and-control (C&C) server points to mspace[.]com[.]vn. This, along with the considerable use of Vietnamese language, may indicate that the apps were from Vietnam. For instance, GhostTeam’s configurations are in English and Vietnamese. English will be the default language if the malware detects the geolocation to be outside Vietnam.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    GhostTeam Adware can Steal Facebook Credentials

  • UK Conviction Arises out of Trend Micro and NCA Partnership -

    On January 15, Goncalo Esteves from Essex, UK plead guilty on 3 charges of computer offenses under UK law:

    • 2 charges against Section 3A of the Computer Misuse Act 1990 (Making/adapting/supplying an article intended for use/to assist in commission of section 1 or 3 Computer Misuse offense)
    • 1 charge against Section 327(1) and Section 334 Proceeds of Crime Act 2002 (Concealing/disguising/converting/transferring/removing criminal property)

    This marks the result of a collaborative investigation that Trend Micro and the National Crime Agency (NCA) in the United Kingdom initiated back in 2015, when the two organizations signed a Memorandum of Understanding (MOU) to work together in the fight against cybercrime. This collaboration is not restricted to this case alone, with Trend Micro actively continuing to assist the UK, as well as other international law enforcement partners, in their fight against cybercrime.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    UK Conviction Arises out of Trend Micro and NCA Partnership

  • New KillDisk Variant Hits Financial Organizations in Latin America -

    We came across a new variant of the disk-wiping KillDisk targeting financial organizations in Latin America. Trend Micro detects it as TROJ_KILLDISK.IUB. Trend Micro™ Deep Discovery™ proactively blocks any intrusions or attacks associated with this threat. Initial analysis (which is still ongoing) reveals that it may be a component of another payload, or part of a bigger attack. We are still analyzing this new KillDisk variant and we will update this post as we uncover more details about this threat.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    New KillDisk Variant Hits Financial Organizations in Latin America

  • Update on Pawn Storm: New Targets and Politically Motivated Campaigns -

    The active espionage actor group Pawn Storm didn’t shy away from continuing their brazen attacks in the second half of 2017. Pawn Storm's attacks usually are not isolated incidents. We can often relate them to earlier attacks by carefully looking at the technical indicators and motives.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    Update on Pawn Storm: New Targets and Politically Motivated Campaigns

  • New Mobile Malware Uses Layered Obfuscation and Targets Russian Banks -

    Last year, we saw the Fanta SDK malware target Russian bank Sberbank users and employ unique defensive measures. Now, another bank malware family has appeared, targeting even more Russian banks while using new and evolved obfuscation techniques. This family is named FakeBank, and so far the related samples we have collected number in the thousands. These samples show that the malware targets not only Sberbank, but also other Russian banks like Letobank and the VTB24 bank.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    New Mobile Malware Uses Layered Obfuscation and Targets Russian Banks

  • January’s Patch Tuesday Fixes 56 Security Issues, Including Meltdown and Spectre -

    This year’s first Patch Tuesday is a busy one. Microsoft released 56 updates that include patches for the Meltdown and Spectre vulnerabilities. The patches also addressed security issues in Windows OS, Internet Explorer, Edge, Office, ChakraCore, ASP.NET, and .NET Framework. Sixteen were rated critical and 38 important, 20 of which can result in remote code execution (RCE).

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    January’s Patch Tuesday Fixes 56 Security Issues, Including Meltdown and Spectre

  • First Kotlin-Developed Malicious App Signs Users Up for Premium SMS Services -

    We spotted a malicious app (detected by Trend Micro as ANDROIDOS_BKOTKLIND.HRX) that appears to be the first developed using Kotlin—an open-source programming language for modern multiplatform applications. The samples we found on Google Play posed as Swift Cleaner, a utility tool that cleans and optimizes Android devices. The malicious app, which has 1,000-5,000 installs as of writing, is capable of remote command execution, information theft, SMS sending, URL forwarding, and click ad fraud. It can also sign up users for premium SMS subscription services without their permission.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    First Kotlin-Developed Malicious App Signs Users Up for Premium SMS Services

  • When Speculation Is Risky: Understanding Meltdown and Spectre -

    For several days, rumors circulated about a serious vulnerability in Intel processors. It wasn’t until January 3 that the official disclosure of the Meltdown and Spectre vulnerabilities was made, and it became clear how serious the problems were. To summarize, Meltdown and Spectre both allow malicious code to read memory that they would normally not have permission to.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    When Speculation Is Risky: Understanding Meltdown and Spectre

  • Washington Post Security Fix

    Comments are closed.
    Wordpress SEO Plugin by Wordpress SEO Plugin