Archive for December, 2016
Posted by Siren on December 31, 2016
Online crooks are inventive enough to defraud users of money without having to infect their computers with malicious software. Email hoaxes work wonders for this purpose. One of these large-scale scams revolves around Telstra, the largest telecommunications company in Australia. Rogue bills and refund emails on behalf of Telstra are aimed at duping customers into […]
Read more →
Posted by Siren on December 21, 2016
It doesn’t take a genius to understand why spam is a godsend for online crooks. It can be used to pull off phishing and spear-phishing attacks, serve up malicious software and conduct a variety of Internet hoaxes. In other words, the present-day cybercriminals don’t necessarily have to leverage sophisticated tools like exploit kits to reach […]
Read more →
Posted by Siren on December 20, 2016
The crapware called Netalpha poses a serious security and stability issue for Android devices. It isn’t new, having originally surfaced around April 2016. The spike in the propagation of this mobile Trojan as of December, though, makes it one of the top infections in the current Android threat landscape. Users hit by this pest keep […]
Read more →
Posted by Siren on December 14, 2016
With a slew of rogue web search providers out there, Amisites stands out from the pack due to its prevalence. Numerous Windows users are currently confronted with an issue where their Internet surfing preferences undergo a number of tweaks to reroute traffic to amisites.com in a recurrent fashion. As per security analysis of the predicament, […]
Read more →
Posted by Siren on December 12, 2016
The browsing problem to be dissected in this posting isn’t new, the early reports about it dating back to mid-2014. Unfortunately, not much has changed ever since. The gist of the issue is as follows: when trying to install a new browser extension or update one currently installed, people get a popup saying, “An error […]
Read more →
Posted by Siren on December 8, 2016
Most ransomware programs encrypt one’s personal files while keeping the operating system intact. Some, however, will hold the whole computer hostage, denying access to the target system altogether. The latter cluster isn’t as vast, with the most widespread strains being HDDCryptor, aka Mamba, the Satana bootkit, and Petya. The newest sample called the Goldeneye ransomware […]
Read more →
Posted by Siren on December 8, 2016
Several days ago, we did a write-up on the international law enforcement effort against a huge online crime network dubbed Avalanche. As a result of this successful global operation, the IT infrastructure of the malware delivery platform in question was shut down. The police were able to seize a total of 39 servers, block at […]
Read more →
Posted by Siren on December 5, 2016
The Locky ransomware family continues to spawn new mutated extortion programs. Its developers are evidently experimenting with payload delivery and data crippling practices. This time, the perpetrators have created another spinoff of their nefarious prototype that adds the .osiris extension to encrypted files and drops the OSIRIS-[victim_ID].htm ransom note. What is the Osiris ransomware? In […]
Read more →
Posted by Siren on December 2, 2016
Autumn 2016 didn’t end well for the international organized cybercrime. The U.S. Department of Justice, the FBI, Europol, Eurojust and Ukraine’s Department of Cyber Police, in collaboration with law enforcement agencies, prosecutors and investigators from 30 countries, zeroed in on a far-flung malware delivery network dubbed “Avalanche”. This well-orchestrated global operation with headquarters in The […]
Read more →
Posted by Siren on December 1, 2016
Most ransomware deployers manage to stay unidentified because they exercise good OPSEC backed by The Onion Router and Bitcoin. The case of the cybercrook who compromised the computer network of the San Francisco Municipal Transportation Agency (Muni) last Friday turned out to be the exception rather than the rule. According to Brian Krebs, a well-known […]
Read more →