Bogus Asian Chat App Steals Login Information
Contributor: Avdhoot PatilNew methods to entice victims into handing over their personal information are always being devised by the people behind phishing websites and the use of fake social...
View ArticleAre the 2011 and 2013 South Korean Cyber Attacks Related?
Overview In the past four years there have been several major cyber attacks against South Korea. We have identified a particular back door (Backdoor.Prioxer) that surfaced during the 2011 attacks. A...
View ArticleJapanese One-Click Fraud Campaign Comes to Google Play
One-click fraud refers to a scam that attempts to lure users interested in adult-related video to a site that attempts to trick them into registering for a paid service. For many years, it has been...
View ArticleSocial Scams - Part 1: Reusing Old Scams to Push Browser Extensions
Last year, we talked about scams and spam circulating on Facebook in our whitepaper. Social networking scammers often reuse common lures to trick users, such as offering free products or additional...
View ArticleSocial Scams - Part 2: How to Clean Up Your Browser and Facebook Timeline
During recent weeks, I have seen different scams on Facebook attempt to convince users to install Google Chrome extensions. I have noticed some conversations taking place around the scams; people not...
View ArticleShylock Beefing Up and Looking for New Business Opportunities
Shylock (a.k.a. The Merchant of Malice) is one of the most sophisticated banking Trojan horse programs presently occupying the financial fraud threat landscape. From its humble beginnings in 2011, it...
View ArticleMicrosoft Patch Tuesday – April 2013
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing nine bulletins covering a total of 14 vulnerabilities. Four of this month's issues are rated...
View ArticleIndian Online Users Enticed to Take the Bitter Red Pill of Truth
We recently observed a small spam campaign that was targeting random users. The campaign focused on users in India. Figure 1. Heatmap of compromised computers related to the spam campaignThe emails...
View Article2013 ISTR Shows Changing Cybercriminal Tactics
The Symantec Internet Security Threat Report (ISTR) 2013 reveals how the threat landscape is evolving, compiling information from more than 69 million attack sensors in 157 countries around the world....
View ArticlePhishers Spoof Bank’s Security Guidance Web Page
Contributor: Sandeep IngaleWhen it comes to financial organizations, being informed about best security practices is every customer’s right. Many organizations provide this information on their...
View ArticleTelugu Movie "Brindavanam" Featured in Phishing Attempt
Contributor: Avdhoot PatilPhishers continue to target Indian movies with phishing scams. The phishing site featuring the movie “Bodyguard” is one example, and this month Symantec observed a phishing...
View ArticleBoston Marathon Bombing Used in Malicious Spam Campaign
Contributor: Christopher MendesOn the afternoon of April 15, 2013, just when many people were on the cusp of conquering another personal milestone by completing the Boston Marathon, they were hit hard...
View ArticleFormer Egyptian Prime Minister Featured in Phishing Attack
Contributor: Avdhoot PatilPhishers have already shown interest in the violence that erupted recently in various parts of the Arab world. The phishing attack involving Syria is a good example. Phishers...
View ArticleMobile Scam: Winning Without Playing
We have blogged before about mobile spam messages, and while email spam declined in the past year to around 66%, mobile spam—although not yet that prevalent—is now gaining ground.Currently the “winning...
View ArticleTelugu Movies Continue to be Fraudster’s Favorites
Contributor: Avdhoot PatilPromotion for Telugu movies has gained momentum in the world of phishing as they continue to be targeted with phishing scams. The phishing site featuring the movie...
View Article2013 First Quarter Zero-Day Vulnerabilities
In the first quarter of 2013, we spotted quite a few zero-day vulnerabilities affecting Oracle Java, Adobe Flash, Adobe Reader, and Microsoft Internet Explorer being exploited in the wild. This blog...
View ArticleUK Government Offers Cash to Small Business to Beef Up Security
Small and medium enterprises (SMEs) in the UK are being offered up to £5,000 (approximately $7,600 USD) in order to improve their cybersecurity. The Innovation Vouchers scheme, being run by the...
View ArticleJava Exploit CVE-2013-2423 Coverage
Java vulnerabilities have always been popular among cybercriminals (exploit kits authors) since they can work across multiple browsers and even multiple operating systems, the potential for infecting...
View ArticlePhishers Campaign for More Votes Against Syrian Regime
Contributor: Avdhoot PatilPhishers are not letting go of the chaos in Syria. They are using a common phishing template and modifying the messages. In March, phishers mimicked the same website of an...
View ArticleMicrosoft Windows XP Support Also Ending in the Malware Community!?
Recently, I discovered a back door Trojan horse program that does not work on Microsoft Windows XP. I would like to present some of the details of this threat, especially as the malware author encoded...
View Article