AutoIt Used To Spread Malware and Toolsets
AutoIt is a very flexible coding language that’s been used since 1999 by coders looking for a fast, easy, and flexible scripting language in Windows. From simple scripts that change text files to scripts that perform mass downloads with complex GUIs, AutoIt is an easy-to-learn language that allows for quick development. The trend for malicious […] more…How to Start your Own Criminal Enterprise
Here’s a late night infomercial for you: How’s that burger flipping going? That cubicle working out ok? Anyway, I’m sure your boss is such a nice guy. Guess what! If you’re interested in a career in criminal hacking, you don’t even need a computer! This special, one-time offer comes to you right now from the […] more…Fake Vertu App Infects Korean and Japanese Android Users
A new threat has surfaced targeting users in Korea and Japan, but this attack, unlike others making the news, is not one motivated by political or ideological dogma. Instead, this one is based purely on old-fashioned greed. Vertu phone owners or those looking for a localized Vertu theme in Korean or Japanese for an Android […] more…Summary of March 20 Korea MBR Wiper
Our investigation and analysis of last week’s MBR wiper attacks in South Korea is still ongoing. This post summarizes our results and available protection. Arrival and File Downloader While the attacks began on March 20, we believe that the attack arrived via spammed messages a day earlier (March 19). This is because on that day, […] more…Online World
The real world isn’t like the online world. In the real world, you only have to worry about the criminals who live in your city. But in the online world, you have to worry about criminals who could be on the other side of the planet. Online crime is always international because the Internet has […] more…2012 Web Malware Trends Report Summary
Sucuri is a website security company focused on the detection and remediation of web malware. In 2012, via our SiteCheck scanner, we scanned 9,953,729 unique domains. This small report is based on the data we were able to compile from that platform and our analysis of that same data. The Foundation Healthy Website View We […] more…Things That Make You Go Hmmm… About Apple "Security"
Dear Tim Cook, Have you searched for the term “antivirus” lately? — I’m guessing not. Here’s what Google Instant is currently offering up: Hmm, “antivirus for mac” — very interesting. You know, maybe it’s time for Apple to adjust its “security culture”? Let’s do some more searches. Here’s what you’ll get from apple.com when you […] more…Happy Birthday Internet – What Are the Challenges Security Experts Predict For the Future?
The Lady has just turned 30. But she isn’t ready to leave the limelight yet, for she is still evolving, still acquiring large number of admirers daily. No wonder that over 2.4 billion people across the world are her diehard users today, according to Internet World statistics. Wondering who she is? She is the wonder […] more…BKDR_KULUOZ – At a Spam Near You
Expecting an online booking or package delivery confirmation? Just make sure to avoid these fake email messages serving BKDR_KULUOZ.PFG. This backdoor was first seen in the wild around April to June of 2012 and a part of a well-known botnet. However, we have recently been noticing several spam variants carrying this malware, like the one […] more…Free Windows 8 Activator? Think Again
Malicious schemes promising free or discounted items are effective because everyone likes a great offer. More so, if the offered item is a much-talked about product like Windows 8. Last year, we unraveled some fake Windows 8 generators, fake Windows 8 antivirus programs, and phishing email that surfaced right after the platform’s release. Though it’s […] more…Android Malware Found to Send Remote Commands
Apart from those apps that register users for unwanted services and those that aggressively push ads, Android users should also worry about apps with backdoor capabilities. While premium service abusers and adware accounted for the majority of malicious apps in 2012, they are, however, not the only threats to Android. Reports of a botnet running […] more…2012 Annual Security Roundup: Post-PC Threats
The “post-PC era” is a phrase which has been a veritable buzzword for some time. However, 2012 saw cybercrime expanding to mobile platforms, highlighting how threats have entered the post-PC era, too. Mobile Threats: 350,000 and Growing By the end of 2012, the number of Android malware grew to 350,000. This was a monumental growth […] more…Every Month is Red October
By now, you’ve probably read the news about “Red October” and you’re wondering how worried you should be? Red October is the latest AV industry case study of digital espionage. (Kaspersky Lab’s post here.) From a technical point of view Red October looks very much like any other targeted corporate espionage attack. The attackers use […] more…The Forrester Wave + Software Updater
Our Corporate Security Business team has been making a lot of smart decisions lately (or it seems so to us anyway). And that’s reflected in this quarter’s The Forrester Wave. Congrats guys! Another decision we’re rather pleased to see from our corporate folks is the implementation of a “software updater” feature into our business products. […] more…On the Topic of AV Being Useless
I have lately been following and participating in discussions as to whether or not antivirus products are useless and just waste of money. And as I am employed by F-Secure, my position on the matter may be rather obvious. But rather than going on with the same tired argument, I would like to shine some […] more…What’s on Your Phone? A Lot More than You Realize.
It’s funny to me that when having conversations about technology people still don’t see the parallel between their smartphone and their computer. Today, smartphone are connected to the Internet and have much of the same information as the personal computer, if not more. Now Androids and other smartphones have become little mini handheld computers. Carriers […] more…More information
- Lawmakers fail to ask NSA chief about agency’s malware plans
- Twitter admits to password storage blunder – change your password now!
- 18,000 Organizations Impacted by NTT Com Data Breach
- Internet Scanned for SAP Systems Affected by RECON Vulnerability
- A Rare Look Inside the Korean DMZ, the ‘Scariest Place on Earth’
- Pirate Bay founders, due to speak, go missing in action
- Flaw in Popular Framework Exposes Many ICS Devices to Attacks
- Building an Integrated IT/OT Security Program: Notes From the Field
- Why Incident Response Must Adopt a Kill Chain Perspective
- Japan’s Nagoya Port Suspends Cargo Operations Following Ransomware Attack