Source: Vernon Silver, Bloomberg
On a Monday in July, Ahmed Mansoor sat in his study in Dubai and made the mistake of clicking on a Microsoft Word attachment that arrived in an e-mail, labeled “very important” in Arabic, from a sender he thought he recognized.
Tag Archives: Malware
Senior Security Analyst Seth Hardy gave a presentation during this year’s SecTor Conference in Toronto, Canada, which took place from 1-3 October, 2012.
Source: AP via The Washington Post
Microsoft says it has settled a computer-fraud case against a website operated by a Chinese businessman that had become a major hub for illicit Internet activity.
Source: Dan Goodin, ars technica
Millions of Internet users in Brazil have fallen victim to a sustained attack that exploited vulnerabilities in DSL modems, forcing people visiting sites such as Google or Facebook to reach imposter sites that installed malicious software and stole online banking credentials.
Source: Graham Cluley, Naked Security
Fabio Assolini, a researcher for Kaspersky Labs, gave a fascinating presentation at the Virus Bulletin conference in Dallas last week, describing how more than 4.5 million home DSL routers in Brazil were found to have been silently hacked by cybercriminals last year.
In this blog post, we report on malware campaigns targeting human rights groups using the PlugX Remote Access Trojan (RAT).
Source: MIT Technology Review
Robert Templeman at the Naval Surface Warfare Center in Crane, Indiana, and a few pals at Indiana University reveal an entirely new class of ‘visual malware’ capable of recording and reconstructing a user’s environment in 3D.
Source: Trustwave Spider Labs
A couple of weeks ago, Citizen Lab announced the discovery of the mobile component to the previously discovered FinFisher Toolkit.
Source: Nart Villeneuve, Trend Micro
Modified versions of the Enfal malware, which figured prominently in the LURID attacks, were seen to have infected more than 800 systems worldwide.
Source: Tech Week Europe
Governments of both east and west, and large private businesses, are thought to be spending vast portions of their budgets on acquiring zero-day exploits.