malware 썸네일형 리스트형 Behind Tax Fraud: A Profile of 3 IRS Scammers Cybercriminals have been taking advantage of tax season for years. While we have seen tax seasons involving countries like Australia and the U.K., it appears that cybercriminals tend to heavily favor the use of Internal Revenue Service (IRS) scams, especially during the US tax season.Over the years, the attackers’ means may have evolved but their goal remains the same—to trick victims into givin.. 더보기 Operation Pawn Storm Ramps Up its Activities; Targets NATO, White House Long-running APT campaign Operation Pawn Storm has begun the year with a bang, introducing new infrastructure and zeroing in on targets including North Atlantic Treaty Organization (NATO) members and even the White House. This is according to the latest intelligence gleaned from Trend Micro’s ongoing research into the attack group, and comes as a follow-up to our widely publicized October 2014 r.. 더보기 Operation RussianDoll: Adobe & Windows Zero-Day Exploits Likely Leveraged by Russia’s APT28 in Highly-Targeted Attack FireEye Labs recently detected a limited APT campaign exploiting zero-day vulnerabilities in Adobe Flash and a brand-new one in Microsoft Windows. Using the Dynamic Threat Intelligence Cloud (DTI), FireEye researchers detected a pattern of attacks beginning on April 13th, 2015. Adobe independently patched the vulnerability (CVE-2015-3043) in APSB15-06. Through correlation of technical indicators.. 더보기 New POS Malware Emerges - Punkey During a recent United States Secret Service investigation, Trustwave encountered a new family of POS malware, that we named Punkey. It appears to have evolved from the NewPOSthings family of malware first discovered by Dennis Schwarz and Dave Loftus atArbor Networks. While this malware shares some commonalities with that family, it departs from the standard operating procedure of the previous v.. 더보기 Exploit kits (still) pushing Teslacrypt ransomware Teslacrypt is a form of ransomware that was first noted in January of this year [1]. This malware apparently targets video game-related files [2,3, 4]. I've seen Teslacrypt dropped by the Sweet Orange exploit kit (EK) [5], and it's also been dropped by Nuclear EK [6]. McAfee saw it dropped by Angler EK last month [2].I saw it again on Wednesday 2015-04-15 from Nuclear EK. Let's take a look at th.. 더보기 MS15-034: HTTP.sys (IIS) DoS And Possible Remote Code Execution. PATCH NOW Denial of Service (DoS) exploits are widely available to exploit CVE-2015-1635, a vulnerability in HTTP.sys, affecting Internet Information Server (IIS) . The patch was released on Tuesday (April 14th) as part of Microsoft's Patch Tuesday.Due to the ease with which this vulnerability can be exploited, we recommend that you expedite patching this vulnerability.Update: We are seeing active exploit.. 더보기 SPEAR - Redirect to SMB We’ve uncovered a new technique for stealing sensitive login credentials from any Windows PC, tablet or server, including ones running previews of the yet-to-be-released Windows 10 operating system. Software from at least 31 companies including Adobe, Apple, Box, Microsoft, Oracle and Symantec can be exploited using this vulnerability, which we have dubbed Redirect to SMB. Carnegie Mellon Univer.. 더보기 Kiosk/POS Breakout Keys in Windows There is an old axiom that goes something like “If an enemy has physical access to your box, it is no longer your box”. With enough time, and baring well-implemented cryptography, someone will get to the data on the system eventually. This axiom definitely applies to public kiosks and in some cases point of sale systems (also known as POS, Point Of Interaction, electronic registers, etc.) depend.. 더보기 64-bit Linux Stack Smashing Tutorial: Part 1 This series of tutorials is aimed as a quick introduction to exploiting buffer overflows on 64-bit Linux binaries. It’s geared primarily towards folks who are already familiar with exploiting 32-bit binaries and are wanting to apply their knowledge to exploiting 64-bit binaries. This tutorial is the result of compiling scattered notes I’ve collected over time into a cohesive whole.I’d like to gi.. 더보기 Kjw0rm VBS Malware Tied To Attacks on French TV Station TV5Monde A malware that is being tied to the recent cyber attack in France is detected by Trend Micro as a variant of the NJWORM/Kjw0rm remote access Trojan (RAT). This malware (with the MD5 hash of 2962c44ce678d6ca1246f5ead67d115a), which we detect as VBS_KJWORM.SMA, is backdoor that may have been around since 2014.Ties to previous targeted attacksOur initial analysis showed that VBS_KJWORM.SMA was crea.. 더보기 이전 1 ··· 23 24 25 26 27 28 29 ··· 57 다음