Skip to main content

Viruses & Malware

Security specialist analyses new Android SpitMo malware

posted onSeptember 20, 2011
by l33tdawg

Trusteer has discovered a virtually undetectable Android trojan called SpitMo that links with the infamous SpyEye Windows malware.

According to Dinesh Venkatesan of Total Defense's security research division, one of the core payloads of SpitMo is to intercept the incoming messages and send the content to a remote server, which is a similar approach seen in the Zeus of Android attack, he notes.

Sophos says Windows 8 anti-virus will be skirted

posted onSeptember 15, 2011
by l33tdawg

Sophos says criminals will likely circumvent built-in anti-virus to be shipped with Microsoft Windows 8 next year.

Windows 8 will ship during the third quarter of 2012 and comes bundled with Microsoft Security Essentials (MSE) that contains anti –viruses and -spyware tools. Microsoft on Tuesday released a preview of the new operating system to developers during its Build conference in the US.

SpyEye hacking kit adds Android infection to bag of tricks

posted onSeptember 14, 2011
by l33tdawg

The SpyEye hacking toolkit has added an Android component that collects the text messages some banks use as an extra security precaution, a researcher said today.

"The standard SpyEye now also entices a user to download an Android app, which is actually a component that's Android-specific malware," said Amit Klein, the chief technology officer of Boston-based Trusteer, a security firm that specializes in online anti-cybercrime defenses.

Bittorrent and utorrent.com hacked to serve malware

posted onSeptember 13, 2011
by l33tdawg

Attackers hijacked two popular Bittorrent websites and tampered with their download mechanisms, causing visitors trying to obtain file-sharing software to instead receive malware.

The hacks on bittorrent.com and utorrent.com replaced the sites' standard software downloads with a piece of fake antivirus software known as Security Shield, an advisory warned. Anyone who downloaded and installed software from those sites between 4:20 a.m. California time and 6:10 a.m. should scan their systems immediately for infections.

Return of the BIOS trojans

posted onSeptember 13, 2011
by l33tdawg

BIOS Trojan Chinese AV vendor 360 has discovered a virus in the wild that makes its home in a computer's BIOS, where it remains hidden from conventional virus scanners. The contaminant, called Mebromi, first checks to see whether the victim's computer uses an Award BIOS. If so, it uses the CBROM command-line tool to hook its extension into the BIOS. The next time the system boots, the BIOS extension adds additional code to the hard drive's master boot record (MBR) in order to infect the winlogon.exe / winnt.exe processes on Windows XP and 2003 / Windows 2000 before Windows boots.

Android botnet infections on the uptick

posted onSeptember 12, 2011
by l33tdawg

The number of infected Google Android devices actively communicating with command-and-control (C&C) servers has grown significantly in recent months and is expected to continue on that path, according to a report released this week by security firm Damballa.

During the first half of 2011, Damballa's network of sensors observed nearly 40,000 Android devices in North America engaged in live interaction with criminal operators, according to the report, which chronicles botnet activity this year.

Hackers flip characters to disguise malware

posted onSeptember 8, 2011
by l33tdawg

Hackers are using a new trick to cloak malicious files by disguising their Windows file extensions to make them appear safe to download, a Czech security company warned today.

The exploit, dubbed "Unitrix" by Avast Software, abuses Unicode for right-to-left languages -- such as Arabic or Hebrew -- to mask Windows executable files (.exe) as innocuous graphic images (.jpg) or Word documents (.doc).