Skip to main content

Viruses & Malware

Flashback Trojan hides inside Safari

posted onOctober 17, 2011
by l33tdawg

The Flashback Trojan first appeared last month. Posing as an Adobe Flash installer, it installed code that could send information about the computer, and also had the capability to download additional malware.

The latest variant - Flashback.D - hides its payload not in the user's Preferences folder (it could previously be found at ~/Library/Preferences/Preferences.dylib), but inside the Safari application bundle.

Air Force downplays drone malware infection

posted onOctober 17, 2011
by l33tdawg

The U.S. Air Force is downplaying the impact of a virus that reportedly compromised systems used to control its unmanned drones, calling the attack nothing more than a “nuisance.”

The malware, which was detected on “standalone” systems at Nevada's Creech Air Force Base, has not affected the U.S. military's remotely piloted aircraft operations, the Air Force said Wednesday in its first official statement about the matter, initially reported by Wired late last week.

Android trojan hides behind QR code

posted onOctober 3, 2011
by l33tdawg

According to Wikipedia QR code is a type of matrix barcode (or two-dimensional code) first designed for the automotive industry. QR codes are becoming more and more popular today and are used in banners, magazines, transport and badges in order to provide quick and easy access to particular information. A QR code has a pretty big capacity (compared to a simple barcode) and is able to store 7089 numeric characters or 4296 alphanumeric characters; and it is more than enough to store text or URL.

Windows 8 anti-virus has a long way to go

posted onSeptember 30, 2011
by l33tdawg

When Microsoft unveiled the Developer Preview of Windows 8 two weeks ago one of the items to get the most attention was it's included unmanaged anti-virus solution.

I was interested in what capabilities it might have and how it would present itself to users who stumble across something malicious. Naturally I installed it on a virtual machine and to a spare disk on a full workstation in my lab. What to test first?

Symantec sees surge in morphing malware and JavaScript abuse

posted onSeptember 28, 2011
by l33tdawg

Proving that most malicious hackers are more than happy to employ time-tested tactics instead of developing sophisticated new techniques and tools, Symantec has reported a huge spike in generic polymorphic malware (malware that changes shape to bypass detection) spread via good old fashioned socially engineered email messages.

Apple erases emerging Mac OS X trojan via malware definition update

posted onSeptember 27, 2011
by l33tdawg

Chinese malware targeting Mac users wasn't actually functional, but Apple has squashed the exploit anyway by delivering a malware definition update that flags the Trojan Horse as being malicious when users try to open it.

New malicious software reported by CNET this week has been added to Mac OS X's internal blacklist of known malware, erasing the threat even before its authors were able to get it to the point of actually functioning.

MySQL.com hacked to distribute malware

posted onSeptember 27, 2011
by l33tdawg

Hackers on Monday compromised MySQL.com, the official website for the popular open-source MySQL database, to distribute malware to visitors, according to security researchers.

The hack caused those who visited the site on Monday morning to be redirected to a domain that attempted to install malware on their machines via the Black Hole exploit pack, Wayne Huang, CEO of web application firm Armorize, said in a blog post Monday. The site appeared to be cleaned by 3 p.m. EST, according to reports.