tag
Malware

Lack of cyber risk insurance could lead to “global financial shock”

The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a “global” shock, a report by a leading insurer has warned.

Cybercrime evolves as criminal gangs join forces with spies – report

Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.

Fake Facebook app attack can lead to your Android being spied upon, and your bank account being hacked

Hackers are using a notorious banking Trojan horse to display a bogus message from Facebook, in an aggressive attempt to infect Android smartphones.

Facebook Webinject Leads to iBanking Mobile Bot

iBanking is a malicious Android application that when installed on a mobile phone is able to spy on its user’s communications. This bot has many interesting phone-specific capabilities, including capturing incoming and outgoing SMS messages, redirecting incoming voice calls, and even capturing audio using the device’s microphone.

German security agency warns botnet ‘army’ has harvested 18 million emails and passwords

Scans of a huge botnet have revealed that it has harvested at least 16 million usernames and passwords for email sites and other online services, according to a report released by German security agency, the Bundesamt für Sicherheit in der Informationstechnik (BSI).

Windigo not Windigone: Linux/Ebury updated

There have been some interesting new developments since we published our report on Operation Windigo. In this blog post you will read about a Linux/Ebury update, and the reaction of the criminal gang to our post.

10 years of Mac OS X malware

The malware problem on Mac OS X is nothing like as bad as it is on Windows, but that doesn’t mean it can be ignored.

“New weapon” against malware intrusion designed by American student

A new technique for spotting cyber attacks has been designed by a young American student – and could prevent attacks against planes and power plants, by looking for abnormal communications within computers, rather than sifting for malicious software.

Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute

DNS hijacking is still going strong and the Win32/Sality operators have added this technique to their long-lasting botnet. This blog post describes how the malware guesses router passwords as part of its campaign to misdirect users, send spam and infect new victims.

Google Glass spyware lets snoopers “see through wearer’s eyes”

Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece – despite Google’s policies explicitly forbidding such programs.

Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.

Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign

Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”

“You have cancer” phishing attack shows how low cybercriminals will go

A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer is circulating. It seems to be sent from a government health care organization – but it’s a malware-laced scam.

Microsoft Word users urged to apply urgent fix after targeted attacks

Microsoft Word users have been urged to update their software after attacks against users of MS Word 2010, where opening a “specially crafted” Rich Text Format file allowed attackers to remotely execute code on the victim’s machine.

Android phones and tablets ship “pre-infected” with malware

Android phones and tablets from four different manufacturers are arriving with malware “pre-installed” – a bogus version of Netflix which sends password and credit card information to Russia, according to app security specialist Marble Security.

Wi-Fi virus Chameleon infects whole cities ‘like airborne disease’

A virus designed to infect Wi-Fi networks can spread through cities “as efficiently as the common cold spreads between humans”, researchers at the University of Liverpool have found.

Corkow: Analysis of a business-oriented banking Trojan

Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.

Mac malware spread disguised as cracked versions of Angry Birds, Pixelmator and other top apps

Pirated versions of popular Mac apps, spread via torrent sites, try to infect your computer with malware… and steal Bitcoins.

British Airways e-ticket malware attack launched via email

If you have received an unexpected email, claiming to come from British Airways, about an upcoming flight that you haven’t booked – please be on your guard.

Online criminals are attempting to infect innocent users’ computers, by disguising their attack as an e-ticket from the airline.

Attack ‘bypasses’ Microsoft’s zero-day protection tool

Researchers have demonstrated an attack that completely bypasses the protections offered by EMET – a Microsoft toolkit used to provide safeguards against zero-day attacks, according to Ars Technica.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

1 article related to:
Hot Topic
22 Apr 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.