Posts Tagged malware

NSA Targeted TOR Network With Malware

From BoingBoing.net:

Initial investigations traced the address to defense contractor SAIC, which provides a wide range of information technology and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) support to the Department of Defense. The geolocation of the IP address corresponds to an SAIC facility in Arlington, Virginia.

, , , , , , ,

No Comments

Smartphone Malware

FBI: Smartphone Users Should be Aware of Malware Targeting Mobile Devices and the Safety Measures to Help Avoid Compromise

The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out e-mail. A link within these advertisements leads to a website that is designed to push Loozfon on the user’s device. The malicious application steals contact details from the user’s address book and the infected device’s phone number.

, ,

No Comments

FBI: Malware Attacking Andriod

Malware Targets Android Smartphones

October 12, 2012
Attention smartphone users: be on guard for various types of malware attacking Android operating systems.

, , , , , ,

No Comments

FBI: Smartphone Malware Safety Tips

Internet Crime Complaint Center (IC3) | Smartphone Malware Safety Tips

The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims.

New E-Scams & Warnings: Smartphone Users Should be Aware of Malware Targeting Mobile Devices and Safety Measures to Help Avoid Compromises

, , , , , ,

No Comments

Citadel Malware Program

Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money

Aug. 17, 2012
– San Diego

, , , , , ,

No Comments

Computer Virus: Reveton Ransomware

Reveton Ransomware

A new Internet virus is holding computers hostage across the United States and beyond.
– FBI, This Week

, , , , , , , ,

No Comments

New Malware Goes After Financial Information

CNET reports on the new Gauss malware tool:

Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.

, , , , , , ,

No Comments

Latest Internet Scams

 

  • “Drive-by” malware installs easily, locks computers, and demands payment. Details

, , ,

No Comments

New Malware Brings Cyberwar One Step Closer

From: MIT
A newly discovered piece of malicious code dubbed Duqu is closely related to the notorious Stuxnet worm that damaged Iran’s nuclear-enrichment centrifuges last year. Although it has no known target or author, it sets the stage for more industrial and cyberwar attacks, experts say.

“This is definitely a troubling development on a number of levels,” says Ronald Deibert, director of Citizen Lab, an Internet think-tank at the University of Toronto who leads research on cyberwarfare, censorship, and espionage. “In the context of the militarization of cyberspace, policymakers around the world should be concerned.”

Indeed, the spread of such code could be destabilizing. The Pentagon’s cyberwar strategy, for example, makes clear that computer attacks on industrial and civilian infrastructure like chemical factories or power grids as well as military networks could be regarded as equivalent to a conventional bombing or other attack, if civilians were endangered.

more

, , , , , ,

No Comments

ZeuS Can Defeat Mobile Phone 2-factor Authentication

From: S21sec and Dave Jevans

It appears now that the criminals have developed malicious software for various mobile smart phones, than can capture these (one-time password)  banking text messages, and forward them to the criminals so that they can  log into the user’s bank account.

In his blog posting, David describes analyzing such a mobile phone malware that was designed for Symbian phones.

He calls this attack, “Man-in-the-mobile”.

, , , ,

No Comments