Skip to main content

Viruses & Malware

Computer Virus Stalls an F1 Team's Car Testing

posted onFebruary 27, 2014
by l33tdawg

Technology can be wonderful, but sometimes — like when your Mom finds your Twitter feed — it just creates new problems that were previously unthinkable. The latest case in point: On the first day of the second Formula One preseason test, the Marussia team saw its 2014 car complete only three laps around the track because some witless oaf in the team garage downloaded a “Trojan-type virus” onto its computer system. Whoops.

Poisoned YouTube ads serve Caphaw banking trojan

posted onFebruary 25, 2014
by l33tdawg

Recent YouTube visitors should be extra vigilant after ads on the website were found to be poisoned.

According to researchers at Bromium Labs, who blogged about the threat on Friday, YouTube's ad network was compromised to host the Styx exploit kit.

The kit, which in recent news was pegged as compromising online retailer Hasbro.com, was leveraged to spread a nasty banking trojan, called Caphaw, to users. The Styx exploit kit spread the malware by taking advantage of a Java vulnerability (CVE-2013-2460), which was patched last year.

New BitCoin Stealing Apple Mac Trojan Called OSX/CoinThief Discovered

posted onFebruary 10, 2014
by l33tdawg

SecureMac has discovered a new Trojan Horse called OSX/CoinThief.A, which targets Mac OS X and spies on web traffic to steal Bitcoins. This malware has been found in the wild, and there are multiple user reports of stolen Bitcoins. The malware, which comes disguised as an app to send and receive payments on Bitcoin Stealth Addresses, instead covertly monitors all web browsing traffic in order to steal login credentials for Bitcoin wallets.

Should you worry about memory-only malware?

posted onFebruary 4, 2014
by l33tdawg

The recent Target data heist of more than 40 million credit card records has many worrying about the impact of memory-only malware. The Target malware, a variant of BlackPOS, is part of a Trojan horse family known as Trojan.POSRAM. After the initial exploitation, these programs simply load themselves into RAM -- they don't install themselves on the hard drive.

The lack of "software footprint" makes RAM-only malware programs elusive. Some people say they're to be truly feared. Should we worry about them more than other malware programs? In a word: No.

AVG kills its remote access service

posted onFebruary 3, 2014
by l33tdawg

AVG has shut down its remote access service Crossloop.

The security company acquired Crossloop in 2012, to support what it says is a “ rapidly growing AVG CloudCare offering”. Despite the @crossloop Twitter account boasting it connected “ 20,000 computer support experts” AVG shuttered the service last Friday.

Users aren't happy because AVG seems to have offered no notice whatsoever: a document.lastModified query on the service's home page produces a date of January 31st, the same day the letter now resident on that page is dated.

SpyEye malware inventor pleads guilty to bank fraud

posted onJanuary 29, 2014
by l33tdawg

The alleged architect of the bank-hacking malware SpyEye, which is said to have infected 1.4 million computers, has pleaded guilty to conspiracy to commit wire and bank fraud. The US Department of Justice announced Tuesday that Russian national Aleksandr Andreevich Panin was the primary developer and distributor of SpyEye.

The Malware That Duped Target Has Been Found

posted onJanuary 17, 2014
by l33tdawg

The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to a new report released Thursday about an operation that investigators have dubbed Kaptoxa.

The malware is a memory-scraping tool that grabs card data directly from point-of-sale terminals and stores it on the victim’s own system for later retrieval.