Source: Nart Villeneuve, Trend Micro
The term “Watering Hole” has become a popular way to describe targeted malware attacks in which the attackers compromise a legitimate website and insert a “drive-by” exploit in order to compromise the website’s visitors.
Tag Archives: Malware
Source: Electronic Frontier Foundation
If the location of a particular computer cannot be determined, the Dutch police would be able to break in without ever contacting foreign authorities.
Source: Tom Brewster, Tech Week Europe
A prominent activist from the UAE has been targeted by surveillance malware likely to have been created by an Italian company, with a French exploit seller implicated too, according to researchers.
This week, at ISS World Americas, an annual surveillance trade show in Washington, law enforcement agents from around the world will gather to learn about the latest in computer spyware.
Source: Vernon Silver, Bloomberg
On a Monday in July, Ahmed Mansoor sat in his study in Dubai and made the mistake of clicking on a Microsoft Word attachment that arrived in an e-mail, labeled “very important” in Arabic, from a sender he thought he recognized.
Senior Security Analyst Seth Hardy gave a presentation during this year’s SecTor Conference in Toronto, Canada, which took place from 1-3 October, 2012.
Source: AP via The Washington Post
Microsoft says it has settled a computer-fraud case against a website operated by a Chinese businessman that had become a major hub for illicit Internet activity.
Source: Dan Goodin, ars technica
Millions of Internet users in Brazil have fallen victim to a sustained attack that exploited vulnerabilities in DSL modems, forcing people visiting sites such as Google or Facebook to reach imposter sites that installed malicious software and stole online banking credentials.
Source: Graham Cluley, Naked Security
Fabio Assolini, a researcher for Kaspersky Labs, gave a fascinating presentation at the Virus Bulletin conference in Dallas last week, describing how more than 4.5 million home DSL routers in Brazil were found to have been silently hacked by cybercriminals last year.
In this blog post, we report on malware campaigns targeting human rights groups using the PlugX Remote Access Trojan (RAT).