Sweet Orange Exploit Kit

Dec 19, 2012 | comments

Malware is a business; people make their living writing and distributing it. Exploit kits are an effective and streamlined methodology of distributing malware; they allow the Bad Guys to distribute payloads at a higher level than we have seen in the past. For this reason we've seen exploit kits grow in popularity over the last few years. BlackHole...

MyBB Security Release

Dec 15, 2012 | comments

The SQL Injection vulnerability, which affected all MyBB versions, affected the post editing section. The second flaw allowed brute-force access because the CAPTCHA system was not effective. An issue which prevented the editor from working in Firefox 16 and newer versions of the web browser has also been addressed. Users are advised to immediately...

Facebook and Walmart Offer $1,000 Christmas Gift Cards Scam

Dec 14, 2012 | comments

On Facebook Some posts, claiming that the social media network has partnered up with Walmart and they’re giving away free $1,000 (764 Euro) gift cards. “Hey friends, I got a $1000 Gift Card from WALMART as a Christmas Gift! Get it right away! -> bil.ly,” the malicious Facebook posts read. Users who fall for it and click on the link are...

Trojan Upclicker: Using a Mouse To Evade Automated Analysis

Dec 14, 2012 | comments

We came across another sample, called Trojan Upclicker, that went one step further: using a mouse to evade automated analysis.  Per the code in Figure , the function SetWinodwsHookExA is called with 0Eh as a parameter. Per MSDN the parameter 0Eh is used to hook a mouse. Pointer fn is the pointer to the hooked procedure in the code. The...

Carberp : Trojan-Spy.AndroidOS.Citmo

Dec 14, 2012 | comments

For a long time, only two families of such malware have been known: ZeuS-in-the-Mobile (ZitMo) and SpyEye-in-the-Mobile (SpitMo). ZitMo and SpitMo work together with their Windows ‘brothers’. Actually, without them, they would look like trivial SMS spy Trojans. It is necessary to mention that during the last two years such attacks have...

California Department of Health Care Mistakenly Publishes Details of 14,000 People

Dec 13, 2012 | comments

State of California has mistakenly published thousands of Social Security numbers on the Internet. The list includes Medi-Cal providers in 25 California counties, including Amador, Calaveras, Colusa, Nevada, Placer, Sutter, Tuolumne and Yuba. The information, belonging to Medi-Cal providers working for In-Home Supportive Services, had been...

Internet Explorer Can Track Your Mouse Cursor

Dec 12, 2012 | comments

Internet Explorer can track your mouse anywhere on the scree,even when you aren’t browsing    A new Internet Explorer vulnerability has been discovered that allows an attacker to track your mouse cursor anywhere on the screen, even if the browser is minimized. All supported versions of Microsoft’s browser are reportedly affected:...

Joomla And WordPress Bulk Exploit serving Fake Antivirus Malware

Dec 11, 2012 | comments

Many Joomla and some WordPress sites exploited and hosting IFRAMES pointing to bad places : Fake antivirus threats display a fraudulent scanning result to intimidate users into “purchasing” the fake antivirus program.WordPress and Joomla exploits have existed for years, and cybercriminals have thus been exploiting them for a long time. Yet...

Gmail Phishing Scam

Dec 11, 2012 | comments

Another phishing scam that relies on the old “account update” theme is currently making the rounds, attempting to trick Gmail users into handing over their usernames and passwords.                                                                                          ...

Beware Of Malware Receipt From Australian Power & Gas

Dec 11, 2012 | comments

Australian Power & Gas Payment Receipt  carry a piece of malware that’s disguised as a harmless-looking PDF file.  Australian users should beware of emails entitled “Approved Payment Receipt” that purport to come from the “team” at Australian Power & Gas.    Example : Subject: Approved Payment Receipt ...

Hack Windows 8 To Get Free Games

Dec 11, 2012 | comments

A Nokia engineer who has previously pointed out security holes in Microsoft’s Windows 8 has now posted a detailed step-by-step explanation of how to hack Windows 8 games. Unfortunately his site is down now : Angel shows how to hack Windows 8 in not one, not two, and not even three ways … but no less than five different ways, showing users...

Open Redirect Vulnerability Identified in Meebo

Dec 11, 2012 | comments

An open-redirect vulnerability Identified in the popular instant messaging platform Meebo. Open-redirect vulnerabilities can be leveraged by cybercriminals to lure their victims to arbitrary domains. The user believes that he/she is visiting a legitimate, reputable site, when they’re actually seamlessly redirected to a malicious one. The...

No Email Day 12-12-12

Dec 11, 2012 | comments

Tomorrow is No Email Day: Ignore your inbox and do something more useful instead Looking at your ever-growing inbox and looking for a reason to ignore it? Tomorrow you have that excuse, as it will be the second annual No Email Day. NO EMAIL DAY by Paul Lancaster from Paul Lancaster A year ago, UK-based Paul Lancaster declared a No Email...

Fake Hotels Awaiting Unwary Guests

Dec 10, 2012 | comments

Cyber-criminals have prepared some dirty tricks for tourists looking for a room over the holidays. And it’s not the same old reception RATs, banking Trojans, wrong hotel transactions and social media baits. Now, they’ve created their own fake hotels and are awaiting unwary guests. The fake websites usually leverage the names and reputations...

Exforel Backdoor Implemented At Network Driver Interface Specification level

Dec 10, 2012 | comments

Security researchers have identified a variant of the Exforel backdoor malware, VirTool:WinNT/Exforel.A, that’s somewhat different from other malicious elements of this kind. The NDIS-level backdoor used by VirTool:WinNT/Exforel.A is much more low-level and stealthy than that used by traditional backdoors – there is no connecting/listening...

Over 400 Indian Websites Defaced by Sizzling Soul and P@khTuN72

Dec 10, 2012 | comments

Over the weekend, a total of over 400 domains and subdomains have been defaced by a couple of hackers calling themselves Sizzling Soul and P@khTuN72. Most of the sites appear to be owned by various Indian businesses. Since the hacktivists haven't defaced the targeted sites’ homepages, most of their owners are probably still unaware of the...
 
Support : INDIATRIKS
Copyright © 2011. INDIATRIKS - All Rights Reserved
Template Edited By Indiatriks
Proudly Powered By Blogger