Android.Exprespam Authors Revamp Gcogle Play to Android Express’s Play
When Android.Exprespam was discovered earlier this month, we quickly posted a blog warning users about the malware and discussing the details of the attack. Word spread quickly as the media, as well as...
View ArticleWaledac Gets Cozy with Virut
Recently, we blogged about the file-infector virus known as W32.Virut and the botnet’s return to distributing new payloads. In the blog, we estimated that the Virut botnet currently consists of 308,000...
View ArticleFaux Cash Prize for Christmas
Contributor: Ayub KhanPhishers consider special occasions as an opportunity to strike at end users and Christmas has always been a favorite for phishers to introduce new phishing baits. For this past...
View ArticleSymantec Protections for Red October
An advanced cyber-espionage network targeting high-profile organizations and governments has recently been unveiled. The main attack method being used in this campaign is spear phishing.The spear...
View ArticleAndroid.Exprespam Potentially Infects Thousands of Devices
Android.Exprespam was discovered at the beginning of January and has only been around for about two weeks, but the scammers seem to be having a lot of success with the malware already. Symantec has...
View ArticleDownloader Targets Down Under
At the time of this blog post, and for the past five days, we have noticed an increase in spam containing malware that targets Australians. The attackers behind this malicious spam campaign appear to...
View ArticleTrojan.Pandex – A New Spam Affair
Contributor: Lionel PayetLast week we saw how W32.Waledac was getting cozy with W32.Virut, but let us not forget about other spam botnets, like Trojan.Pandex (a.k.a. Cutwail), as they also persist in...
View ArticleMDK: The Largest Mobile Botnet in China
In February 2012, we blogged about Android.Bmaster (a.k.a. Rootstrap), which infected hundreds of thousands of devices. At that time, it was the largest mobile botnet documented to date. Recently, the...
View ArticleTrojan Horse Using Sender Policy Framework
It is important for malware authors to keep a solid network connection between their malware on compromised computers and their own servers so that the malware can receive commands and be updated....
View ArticleUpswing in Ransomware Activity
As we predicted toward the end of last year, we are once again seeing an upswing in ransomware activity in 2013. The ransomware extortion scam has been in existence now for a number of years but its...
View ArticleMalicious Spam Emails Target Nightclub Disaster in Santa Maria
Symantec Security Response has observed that spammers are distributing malicious emails that attempt to lure users into viewing a video of the incident that killed 233 people recently in a horrific...
View ArticleGift of Trojan.Smoaler Delivered Through Fake FedEx Emails
Symantec Security Response is aware that fake FedEx emails have been circulating recently. The emails claim the user must print out a receipt by clicking on a link and then physically go to the nearest...
View ArticleBackdoor.Barkiofork Targets Aerospace and Defense Industry
Contributor: Joseph BinghamA few weeks ago, we observed a spear phishing campaign targeting groups in the aerospace and defense industry. We identified at least 12 different organizations targeted in...
View ArticleSyrian Regime’s Opposition Gains Phishers’ Sympathy
Contributor: Avdhoot PatilRecently, cybercriminals have been focusing on the conflict in Syria to incorporate current events in their cyber warfare. In December 2012, phishers mimicked the website of a...
View ArticleBamital Bites the Dust
Today we are pleased to announce the successful takedown of the Bamital botnet. Symantec has been tracking this botnet since late 2009 and recently partnered with Microsoft to identify and shut down...
View ArticlePhishing: The Easy Way to Compromise Twitter Accounts
Last week, Twitter announced that the details of around 250,000 of its users may have been compromised before it discovered and stopped an attack on their network. There is not much you can do when...
View ArticleMoney Transfer Spam Campaign with HTML Attachment
Phishers love to arouse curiosity and/or fear in the user’s mind and this stimulus can compel people to set aside all caution as well as any safety measures they might have in place to avoid such...
View ArticleCyber Threats Increase around Valentine’s Day
Most people are eagerly waiting for Valentine's Day. The day is an opportunity to spread affection and excitement amongst loved ones by exchanging gifts. Last year we observed prominent spam attacks...
View ArticleAdobe Zero-day Used in LadyBoyle Attack
Yesterday, Adobe released an out of cycle patch that fixed two zero-day vulnerabilities (CVE-2013-0633, CVE-2013-0634) for Adobe Flash Player 11.5.502.146 and earlier versions for both Windows and...
View ArticleMalvertising and Dynamic DNS: A Never Ending Story
Contributor: John HarrisonSymantec has been tracking a large malvertising campaign for over 5 months now. The campaign is still active and uses Dynamic Domain Name System (DDNS) to prevent itself from...
View Article