Skip to main content

Viruses & Malware

Stuxnet is no big deal, ESET chief says

posted onOctober 6, 2010
by hitbsecnews

A recently discovered cyber virus known as “Stuxnet” only made waves in the media as experts were able to quickly thwart the risk, according to the Europe, Middle East, and Africa sales manager of antivirus software company ESET.

Stuxnet was not a serious attack due to the way it was spread, Miroslav Mikus told the Hürriyet Daily News & Economic Review on Tuesday during his visit to the company's Turkish office.

Fake Apple iTunes Receipts Used as Malware Tool

posted onOctober 4, 2010
by hitbsecnews

PandaLabs said Monday that the company has discovered fake iTunes receipts that have begun to be sent to users in an attempt to steal personal details. Ironically, the attack vector is via Flash - a technology Apple refuses to use for its alleged security weaknesses.

Twitter Shuts Down Second Worm In A Week

posted onSeptember 27, 2010
by hitbsecnews

Twitter shut down the second worm in less than a week over the weekend, this one spreading an attack that blasted pornographic tweets about goats to other users after enticing them with the subject "WTF."

The worm attempts to lure users with the subject "WTF" followed by the malicious link. Once they click, users are taken to a blank Web page that contains malicious code using a cross-site request forgery. The malware then automatically sends out vulgar tweets to Twitter from the user's account.

Spammers Target LinkedIn Members with Malware

posted onSeptember 27, 2010
by hitbsecnews

Malicious cyber criminals aren’t just targeting Twitter users; LinkedIn members are in their crosshairs, as well.

LinkedIn members were reportedly deluged with spam e-mail messages masquerading as connection requests from the career-oriented social networking site in the morning of Sept. 27.

Clicking on these requests sent users to a Web site that displayed "PLEASE WAITING...4 SECONDS" before redirecting them to Google. During those four seconds, the Web site downloaded ZeuS data-theft malware on to their PCs, according to Cisco.

Why the Stuxnet worm is like nothing seen before

posted onSeptember 27, 2010
by hitbsecnews

Stuxnet is the first worm of its type capable of attacking critical infrastructure like power stations and electricity grids: those in the know have been expecting it for years. On 26 September, Iran's state news agency reported that computers at its Bushehr nuclear power plant had been infected by Stuxnet.

Computer viruses, worms and trojans have until now mainly infected PCs or the servers that keep e-businesses running. They may delete key system files or documents, or perhaps prevent website access, but they do not threaten life and limb.

Stuxnet worm created by team of hackers

posted onSeptember 26, 2010
by hitbsecnews

A POWERFUL computer code attacking industrial facilities around the world, but mainly in Iran, was probably created by experts working for a country or a well-funded private group.

The malicious code, called Stuxnet, was designed to go after several "high-value targets," Liam O Murchu, manager of security response operations at Symantec Corp, said.

Stuxnet was built to sabotage Iran nuclear plant

posted onSeptember 22, 2010
by hitbsecnews

An industrial control security researcher in Germany who has analyzed the Stuxnet computer worm is speculating that it may have been created to sabotage a nuclear plant in Iran.

The worm, which targeted computers running Siemens software used in industrial control systems, appeared in July and was later found to have code that could be used to control plant operations remotely. Stuxnet spreads by exploiting three holes in Windows, one of which has been patched.

Malware not scanning IPv6 space (yet)

posted onSeptember 21, 2010
by hitbsecnews

The chief scientist of a group responsible for providing a stable online infrastructure in Australia says the evolution in the internet's lingua franca is safer from web nasties than that in use today.

Geoff Huston presented research results last week into "dark traffic" in IPv6, the next iteration of internet protocol, the chief scientist for the Asia Pacific Network Information Centre concluding there was no evidence virus scanners probed its empty-address blocks.