Simple njRAT Fuels Nascent Middle East Cybercrime Scene
Symantec has observed the growth of indigenous groups of attackers in the Middle East, centered around a simple piece of malware known as njRAT. While njRAT is similar in capability to many other...
View ArticleCryptoDefense, the CryptoLocker Imitator, Makes Over $34,000 in One Month
On the back of Cryptolocker’s (Trojan.Cryptolocker) perceived success, malware authors have been turning their attention to writing new ransomcrypt malware. The sophisticated CryptoDefense...
View ArticleProactive Cybersecurity – Taking Control Away from Attackers
Attacks are getting bigger and bolder and this calls for a new approach to cybersecurity. Cybercriminals have broadened their scope beyond conventional computer systems and now almost every connected...
View ArticleFinancial Trojans’ Persistent Attacks on the Japanese Internet Community
In recent years, the Japanese Internet community has faced difficult times trying to combat financial Trojans such as SpyEye (Trojan.Spyeye) and Zeus (Trojan.Zbot). The number of victims affected and...
View ArticleTwitter Spam: Compromised Accounts and Websites Lead to Diet Spam
Earlier this week, a large number of Twitter accounts were compromised and used by spammers to spread “miracle diet” spam. The compromised accounts included public figures, as well as average users of...
View ArticleFake Voting Campaign Steals Facebook Users’ Identities
Contributor: Parag SawantPhishers continuously come up with various plans to enhance their chances of harvesting users’ sensitive information. Symantec recently observed a phishing campaign where data...
View ArticleThe Dark Power of Windows PowerShell
Windows PowerShell, the Microsoft scripting language, has made the headlines recently due to malware authors leveraging it for malicious purposes. Symantec has identified more PowerShell scripts being...
View ArticleThe 2013 Internet Security Threat Report: Year of the Mega Data Breach
Once again, it’s time to reveal the latest findings from our Internet Security Threat Report (ISTR), which looks at the current state of the threat landscape, based on our research and analysis from...
View ArticleMicrosoft Patch Tuesday – April 2014
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing four bulletins covering a total of 11 vulnerabilities. Seven of this month's issues are rated...
View ArticleInstagram Scam: Lottery Winners Impersonated to Offer Money for Followers
Over the last week, Instagram scammers have been posting images offering fake lottery winnings to followers. They have convinced users to share the posts, give up personal information, and even send...
View ArticleHeartbleed Bug Poses Serious Threat to Unpatched Servers
A newly discovered vulnerability in one of the most commonly used implementations of the SSL and TLS cryptographic protocols presents an immediate and serious danger to any unpatched server. The bug,...
View ArticlePhishers Spoof Facebook Appearance and Promote India’s Aam Aadmi Party
Politicians are frequently featured on phishing sites and in light of the ongoing general election in India, phishers are starting to target Indian users by using a local politician and his party as...
View ArticleHeartbleed – Reports from the Field
It has been now five days since details emerged regarding the “Heartbleed” vulnerability in OpenSSL. During this time we have been researching the impact of the vulnerability, tracking the patch states...
View ArticleHeartbleed Poses Risk to Clients and the Internet of Things
While most of the focus on Heartbleed has been on vulnerable public websites, the bug affects much more than this. While most popular sites are no longer vulnerable, this does not mean that end-users...
View ArticleBabies Offered for Adoption in 419 Scam
A variation on the 419 email scam is being used by fraudsters to take advantage of couples desperate to adopt a child. Once they are carefully lured into a fake adoption process, the victims are then...
View ArticleExpect Beautifully Packaged Spam along with Your Easter Gifts!
Contributor: Azam RazaEaster, like all other celebrations is meant to be a day of jubilation, which of course means gifts, shopping, and spreading cheer. However, cheer is not the only thing that is...
View ArticleHighlights from the SyScan 2014 Conference
An industry conference is always a good place to learn and get updates on the latest security trends. I recently attended the Symposium on Security for Asia Network (SyScan), an annual conference held...
View ArticleOperation Francophoned: The Persistence and Evolution of a Dual-Pronged...
Contributor: Andrea LelliOperation Francophoned, first uncovered by Symantec in May 2013, involved organizations receiving direct phone calls and spear phishing emails impersonating a known...
View ArticlePhishers Pump out Heartbleed Attacks
Contributor: Binny KuriakoseSymantec has recently detected phishing emails related to the Heartbleed Bug. The phisher attempts to gather information by posing as a US military insurance service with a...
View ArticleZero-Day Internet Explorer Vulnerability Let Loose in the Wild
Symantec is aware of reports of a zero-day vulnerability (CVE-2014-1776) that affects all versions of Internet Explorer.Microsoft released a security advisory (2963983) about a vulnerability in...
View Article