Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.
A little-known banking trojan, developed in Russia, has managed to infect thousands of victims’ computers without the knowledge of their owners. Graham Cluley takes a closer look.
Patrick Garratt is a 15-year veteran of the gaming industry, having been behind the launches of major news sites such as Eurogamer and VG247 – but in the DIY, anything-goes world of PC gaming, even he still falls for a scam or two. Is it REALLY his fault, though?
Players of the hit game have been targeted with a Trojan disguised as a semi-official add-on client for the game, made by Curse – but it is fake, laced with a Trojan which steals passwords, account emails and authenticator information at once, Blizzard said.
The source code for banking malware Carberp has been released online – raising the possibility a new wave of attacks using variants of the sophisticated Trojan.
Computer viruses are making a comeback, according to Microsoft’s Director of Trustworthy Computing – with numbers rising globally in 2012. Tim Rains says that for several years, viruses have been “out of favour with attackers”, but points to statistics showing that they have made a comeback in 2012, at least in certain territories.
ESET Mobile Security has scored full marks for detecting mobile banking threats in a group test conducted by Germany’s AV-TEST magazine, focused on detecting dangerous new banking Trojans.
Emailed wedding invitations have popped back up as a way to distribute malware Will this tactic join other malware-email staples like malicious tax season messages.
Use of pirated and counterfeit Windows software has tripled since 2006, according to analysts IDC – creating a fertile breeding ground for malware. For the report, entitled ‘The Dangerous World of Pirated and Counterfeit Software’, IDC analysts conducted 533 tests on counterfeit software from P2P and web sources.
Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.
Malware infecting 25,000 computers, mostly in the United States, pumping out 80 million spam messages per hour? ESET researchers sinkhole to investigate Win32/TrojanDownloader.Zortob.B
Analysis of malicious code dubbed Win32/Caphaw (a.k.a. Shylock) attacking major European banks, with ability to automatically steal money when the user is actively accessing his banking account.
NBC.com may have sent visitors to infected URLs serving up Trojan software (RedKit) for 24 hours. At the time of this blog post ESET researchers still see some related sites similarly compromised.
Technical analysis of malware that abuses code signing certificates normally used to positively identify a software publisher and to guarantee code is unchanged.
A shortened and updated version of the advice that David Harley and Andrew Lee gave to potential phish victims in an earlier paper. Part 3 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.