Skip to main content

Viruses & Malware

China Is Tops in Targeted Malware

posted onMarch 25, 2010
by hitbsecnews

Symantec's MessageLabs Intelligence Report discovered that while most unsolicited and malware-tainted e-mail is delivered through e-mail servers based in the U.S., the largest percentage of these missives are actually sent from hackers based in China.

In March, security researchers also found that Chinese cyber crooksexpended a lot of time and energy targeting specific targets at American companies and government agencies.

Be prepared for the year of mobile malware

posted onMarch 18, 2010
by hitbsecnews

The number of types of attack on mobile devices may not be growing, but circumstances are conspiring to create a genuine threat, says Rik Ferguson.

The rise in threats to mobile devices is definitely real, although still a long way from reaching epidemic proportions. The real message for the coming months is about preparedness.

Tracking down malware

posted onMarch 15, 2010
by hitbsecnews

Criminals increasingly attempt to camouflage the traces of their malware on the internet to keep control of a hijacked server for as long as possible. However, their paths can be retraced using special tools to identify the vulnerability the malware intends to exploit to enter a system.

How To Use Autoruns to Manually Clean an Infected PC

posted onMarch 15, 2010
by hitbsecnews

There are many anti-malware programs out there that will clean your system of nasties, but what happens if you’re not able to use such a program? Autoruns, from SysInternals (recently acquired by Microsoft), is indispensable when removing malware manually.

There are a few reasons why you may need to remove viruses and spyware manually:

Trusteer Rolls out Malware Forensic Tool for Banks

posted onMarch 15, 2010
by hitbsecnews

Security vendor Trusteer's latest product will allow banks to remotely investigate their customers' computers if it is suspected the PC has been hacked.

The service, called Flashlight, is designed to enable banks security experts to quickly identify what types of malicious software programs customers are encountering in order to build better defenses, said Mickey Boodaei, Trusteer's CEO.

Trojan Phones: The New New Virus Vehicle

posted onMarch 14, 2010
by hitbsecnews

Imagine buying a new SD card for your digital camera. You go into the store, find a nice 32GB Class 6 SD card at the right price and take it home. It’s sealed in one of those plastic display cards that takes remarkably sharp objects to open them. It’s new, and perfect.

You are very happy because for just a small premium, the card came pre-formatted for your brand of digital camera. There’s nothing to do but insert the card, and take pictures to your hearts content.

Koobface Worm Doubles Its Number Of Command And Control Servers In 48 Hours

posted onMarch 11, 2010
by hitbsecnews

The shut down and recovery of the Troyak-as command and control center (C&C) for the active Zeus botnet was good news for the whole IT security community. But unfortunately, as some botnets struggle, others stay unaffected. As part of their relentless effort to stay ahead of cybercriminals, Kaspersky Lab's research and analysis team have recently monitored a surge in Koobface C&C servers, the highly prolific worm infesting social networking sites.

Vodafone distributes Mariposa botnet

posted onMarch 9, 2010
by hitbsecnews

Here is yet another example of a company distributing malware to its userbase. Unfortunately it probably won’t be the last.

Today one of our colleagues received a brand new Vodafone HTC Magic with Google’s Android OS. “Neat” she said. Vodafone distributes this phone to its userbase in some European countries and it seems affordable as you can get it for 0€ or 1€ under certain conditions.

Viruses threaten Canadian online voting validity

posted onMarch 9, 2010
by hitbsecnews

With the increasing shift from analog to digital, some elections officials are unsurprisingly chomping at the bit to move toward Internet-based voting. Last year, Elections Canada officials mused about the possibility of online voting trials, noting the potential benefits of increasing voter participation, particularly among younger demographics.

More recently, the province of Alberta opened the door to incorporating new technologies into their voting processes as part of an electoral reform package.

Hackers Channeling R&D Into Better Malware

posted onMarch 3, 2010
by hitbsecnews

IT companies spend billions on R&D to improve their products and take advantage of the latest technologies. But as it turns out, so do cybercriminals, and that strategy seems to be working pretty well.

Cloud computing, search engine optimization and security exploit frameworks are all examples of tools that can help both legitimate companies and hackers conduct their business more effectively, security researchers said Tuesday in a panel discussion at RSA 2010 in San Francisco.