Today, ESET researchers reveal a family of Linux malware that stayed under the radar for more than 5 years. We have named this family Linux/Mumblehard. A white paper about this threat is available for download on WeLiveSecuriy.
La familia de malware Linux/Mumblehard pasó desapercibida durante 5 años. Está conformada por un backdoor y un daemon para el envío de spam creados en Perl.
The US Department of Justice has charged three men with what is being described as “one of the largest reported data breaches in US history,”
Fake Amazon gift cards are being sent to Android devices via text message, but it’s malware not discounts that is being spread among the recipients.
Concerns over Snapchat privacy rocketed this week after users were bombarded with spam messages written in a style which suggests that a user’s own friends think they are overweight.
State organizations and private businesses from various sectors in Ukraine and Poland have been targeted with new versions of BlackEnergy, a malware that’s evolved into a sophisticated threat with a modular architecture.
Online criminals are spamming out messages claiming that invoices are overdue. But attached to the emails are .ARJ files containing a malicious payload – don’t allow your computer to become infected.
Three weeks ago, iSIGHT Partners discovered a new Ransomware encrypting victims’ documents. They dubbed this new threat TorrentLocker. TorrentLocker propagates via spam messages containing a link to a phishing page where the user is asked to download and execute “package tracking information”. In August, only Australians were targeted with fake Australian Post package-tracking page. While
Si todavía te estás preguntando qué pasó con el vuelo MH370 de Malaysia Airlines, que desapareció misteriosamente en su trayecto desde Kuala Lumpur hacia Pekín en marzo de 2014, ten cuidado al buscar noticias: ha estado circulando por Facebook un falso mensaje que asegura que el avión fue encontrado por un marinero. Presenta un video en el que supuestamente se muestra un informe con todos los detalles, el cual incluye la foto de un avión hundido en el agua.
Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information – one, a way to contact them, and two, the fact they’re in need of a job.
Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives”. The attack appeared to have come via a third-party service connected to Twitter.
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”
If you have received an unexpected email, claiming to come from British Airways, about an upcoming flight that you haven’t booked – please be on your guard.
Online criminals are attempting to infect innocent users’ computers, by disguising their attack as an e-ticket from the airline.
Less innovative than the scam mails described in my previous articles (Phish to phry and The Thoughtful Phisher II), there are those phish messages that suggest a problem with your account that they need you to log in to fix. (Of course, you aren’t really logging in to a legitimate site.) Mostly their appeal is
YouTube comments channels are widely known as a toxic and hostile environment – but Google has admitted that YouTube’s recent integration with Google Plus has made things even worse.
[A much shorter version of this article appeared in the October 2013 Threat Radar Report as ‘The Thoughtful Phisher’. As these particular scam/spam campaigns don’t seem to be diminishing, however – indeed, some of the phishing techniques seem to be getting more sophisticated – I thought perhaps it was worth updating and expanding for a