Skip to main content

Viruses & Malware

Indian Foreign Ministry hit by spyware problem

posted onFebruary 16, 2009
by hitbsecnews

The computers of Indian External Affairs Ministry have been hit by cybersecurity nightmare at a time when the Ministry is heavily engaged in dealing with diplomacy in post? Mumbai strikes situation.

“The Indian Express” while quoting the Ministry sources said that “several” of its over 600 computers have been infected by “spyware,” a programme that surreptitiously gets installed on a computer to track or take control of the userÆs actions.

Virus 2090 Annoys Korean Computer Users

posted onFebruary 12, 2009
by hitbsecnews

A destructive bug dubbed ``2090'' is biting Korean computer users hard, security experts said Thursday.

The computer virus adjusts computers' clocks to ``10:00 AM January 1st 2090,'' and may inflict serious damage to systems based on Microsoft Windows.

Houston justice system floored by virus

posted onFebruary 11, 2009
by hitbsecnews

The now infamous Conficker worm is playing havoc with the municipal court operations in Houston.

The court system had to close down on Friday afternoon after the computer virus affected access to data on court cases. Courtroom operations aren't expected to be back in business before Thursday morning.

Indonesian Mobile Malware Mutates

posted onFebruary 9, 2009
by hitbsecnews

Kaspersky researchers warn that the previous mobile trojan transferring credit from infected phones without authorization has seen a new variant that is able to run on J2ME phones. This allows the attackers to target a significantly larger number of mobile customers.

Two weeks ago, malware analysts from the Kaspersky anti-virus vendor advised about a new type of malware that targets mobile phones running the Symbian OS. Even though restricted to Indonesia only, the trojan, which was written in Python, had the potential to make the jump to other countries as well.

Pinch Trojan infecting 4,000 web users daily

posted onFebruary 6, 2009
by hitbsecnews

More than 4,000 web users every day are being infected by the Pinch Trojan, even though its creators are now behind bars, says Prevx.

According to the security fim, a new version of the malware is penetrating existing antivirus software and then hides on a PC, stealing sensitive personal data such as bank account log-ins and passwords.

Prevx says that currently the Trojan is affecting web users in the US and South America with under 25 percent of those infected based in the UK.

New Virus Bulletin tests for the unknown

posted onFebruary 4, 2009
by hitbsecnews

Security testing publication Virus Bulletin has come out with a new set of tests for anti-malware products. The group best known for its iconic VB100 test has unveiled a new set of tests known as the 'reactive and proactive' or RAP test.

The RAP will check the ability for anti-malware products to detect accurately identify new and unknown malware samples. The series of four tests will be comprised entirely of malware samples collected within the last three weeks of submission.

Cloud computing is a storage spot for malware

posted onFebruary 4, 2009
by hitbsecnews

Cloud computing may be a place for malicious files to be stored and transmitted from.

David Hobson, managing director of GSS, warned that cloud computing may turn into a ‘malware-fest' after researchers detected a method of using the Amazon EC2 service as a BitTorrent host/downloading mechanism.

Cybersecurity contractor warns of virus on own network

posted onFebruary 4, 2009
by hitbsecnews

SRA International, a government contractor that provides cybersecurity and privacy services, has warned its employees their personal information may have been stolen after hackers planted a virus on its computer network.

The malware was installed on the same network that stored employees' personal data including names, addresses, dates of birth, health information, and social security numbers, according to a letter (PDF) filed with Maryland's Office of Attorney General. Information might also include personal employee details included in security position questionnaires.

How Do They Make All That Malware?

posted onFebruary 2, 2009
by hitbsecnews

I was talking to a head research guy at an anti-virus company recently and he said that the big anti-virus firms are all getting about 50,000 new malware submissions every day. 50k! How do they, the malware authors, do it? And how is it that the AV companies actually get the malware?

Welcome to the malware generation businss model. So you want to be a malware star? Well listen now to what I say. Unfortunately I will be somewhat vague, but the fact is that anyone who's technically competent and has the will to do so can fine the missing pieces of the puzzle I'll lay out.