Weekly analysis – 27th February 2010 to 6th March 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 27th February 2010 to 6th March 2010

Excerpted from:
Weekly analysis – 27th February 2010 to 6th March 2010

Share/Save/Bookmark

Weekly analysis – 20th February 2010 to 27th February 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 20th February 2010 to 27th February 2010

Originally posted here:
Weekly analysis – 20th February 2010 to 27th February 2010

Share/Save/Bookmark

Weekly analysis – 30th January 2010 to 6th February 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 30th January 2010 to 6th February 2010

Excerpt from:
Weekly analysis – 30th January 2010 to 6th February 2010

Share/Save/Bookmark

Weekly analysis – 16th January 2010 to 23rd January 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 16th January 2010 to 23rd January 2010

Read more:
Weekly analysis – 16th January 2010 to 23rd January 2010

Share/Save/Bookmark

Weekly analysis – 9th January 2010 to 16th January 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 9th January 2010 to 16th January 2010

Go here to see the original:
Weekly analysis – 9th January 2010 to 16th January 2010

Share/Save/Bookmark

Weekly analysis – 3rd January 2010 to 10th January 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 3rd January 2010 to 10th January 2010

Read the original post:
Weekly analysis – 3rd January 2010 to 10th January 2010

Share/Save/Bookmark

Malware of the week

No Comments

What’s the malware application of the week?

According to a PandaLabs report, it’s the Oscarbot.UG worm, the Spammer.AJF Trojan, “and a series of P2P applications used to distribute the adware Lop,” says Help Net Security.

“Oscarbot.UG is a worm with backdoor features, which spreads using AOL Instant Messenger – AIM,” it says.

It copies itself to the system as well as USB drives that connect to it, connects to a Web page, “and uses IRC to send and receive information,” ys the story, going on:

To prevent detection, it stops running if it finds that it is being tried on virtual machines such as vmware, a sandbox or in a honeypot (these tools are often used to check in a controlled environment if an executable file is running malicious commands).

Spammer.AJF Trojan sends spam from infected computers, Help Net Security states, continuing:

“The Trojan creates several copies of itself on the infected system. It also creates a series of Windows Registry entries affecting Internet security, including one which prevents Internet Explorer from warning about non-secure or dubious Web pages.

PandaLabs, “also detected two spoof P2P application installers, BitRoll-5.0.0.0 and Torrent101-4.5.00.0, which are being used to install the Lop adware on users’ systems,” adds the story.

Excerpt from:
Malware of the week

Share/Save/Bookmark