October 8, 2013
Tag Archives: Malware
In this post, we report on “Surtr”, a malware family that has been used in targeted malware campaigns against the Tibetan community since November 2012
This blog post reports on a malware attack in which a compromised version of Kakao Talk, an Android-based mobile messaging client, was sent in a highly-targeted email to a prominent individual in the Tibetan community. The malware is designed to send a user’s contacts, SMS message history, and cellular network location to attackers. This post was updated on 18 April 2013.
Update to “Permission to Spy: An Analysis of Android Malware Targeting Tibetans” in Tibetan: གསང་མྱུལ་བར་ཆོག་མཆན། ཨན་སྒྲོ་དྲ་འབུ་ཅན་གྱི་མཉེན་ཆས་ཤིག་གིས་བོད་རིགས་རྣམས་དམིགས་འབེན་ཏུ་བཟུང་བའི་སྐོར་ལ་བརྟག་དཔྱད།
This is the update to “Permission to Spy: An Analysis of Android Malware Targeting Tibetans”, written in Tibetan language.
Source: Josh Halliday, The Guardian
Cyber criminals have targeted government officials in more than 20 countries, including Ireland and Romania, in a complex online assault seen rarely since the turn of the millennium.
In this research brief, Seth Hardy describes malware (“GLASSES”) sent in 2010 that is a simple downloader closely related to malware described by Mandiant in their APT1 report. GLASSES appears to be a previous version of malware called GOGGLES by Mandiant, and was sent in a highly targeted email to a Tibetan human rights organization, demonstrating that APT1 is involved in more than just industrial and corporate espionage.
RCI’s Wojtek Gwiazda spoke to Seth Hardy about recent Citizen Lab research on targeted attacks against human rights organizations and others, including the Dalai Lama.
Source: Paul F. Roberts, IT World
Apple Computer took a bold step recently in its battle against malicious software that runs on its Mac operating system.
Source: Nart Villeneuve, Trend Micro
The term “Watering Hole” has become a popular way to describe targeted malware attacks in which the attackers compromise a legitimate website and insert a “drive-by” exploit in order to compromise the website’s visitors.
Source: Electronic Frontier Foundation
If the location of a particular computer cannot be determined, the Dutch police would be able to break in without ever contacting foreign authorities.