cybercrime
Scam as a service 2: the B team
Interest in Tor based threats is increasing to the extent that some vendors will scoop up all activity they find on Tor and provide you a nice front end to search through it at your leisure. This might lead the casual observer to assume that the darkness is a one stop shop for cyber threats, but criminals existed on the internet prior to Tor, and still do quite well for themselves without it. In fact, bad guys with good OPSEC tend to be the exception, rather than the rule. So let’s take a quick look at some unpleasant stuff and the nadir of bad OPSEC, Facebook. Categories: Tags: darknetfacebookscamsocial mediatech supporttech support scam |
The curious case of a Sundown EK variant dropping a Cryptocurrency Miner (updated)
Mobile menace monday: safe practices with your mobile device
‘Tis the season for gift giving, and who wouldn’t be excited about receiving a brand new mobile device! Before you start loading your new device with various apps, we shared in this post several safe practices to make sure your holidays stay malware-free. Categories: Tags: AndroidMobilemobile menace mondaymobile securitytriple m |
More phishy sponsored tweets
Watch out: sponsored Tweets leading to phishing pages are doing the rounds once more. We take a look at the latest phishing scam being pushed to unsuspecting Twitter users, and show how the scammers are after a double-whammy of login credentials and credit card information. Categories: Tags: phishphishingscamscammerssponsoredtweettwitter |
Post-holiday spam campaign delivers Neutrino Bot
Spammers took a break over the holidays but are back in form with a campaign pushing the Neutrino Bot. Categories: Tags: ddosmacromicrosoftMicrosoft Security Officeneutrino botspam |
Clickjacking campaign abuses Google Adsense, avoids ad fraud bots
Ad fraud is a billion dollar problem for advertisers. When real users are tricked into clicking on ads they can’t even see, (almost) everyone loses. Categories: Tags: ad frauddoubleclickEKexploit kitsGoogleGoogle AdsGoogle Adsensemalvertisingmalware |
From a fake wallet to a Java RAT
We take a look at Adwind, one of the most popular Java Remote Administration Tool. This RAT was distributed via a phishing email and amongst other things, can steal credentials or capture screenshots on the infected machine. Categories: Tags: AdwindbitcoindecryptorhasherezadeJRAT botmalwarephishing |