Skip to main content

Posts

Showing posts with the label malware

#ZoneH Defacements 02/12/2012 ( #Hack #Website #Deface )

Zone-H Defacements 02/12/2012 http://forum.ippbm.gov.my/ index.html notified by abaywashere http://www.zone-h.org/mirror/ id/18680533 http://onlinesurvey.ippbm.gov. my/index.html notified by abaywashere http://www.zone-h.org/mirror/ id/18680535 http://ippbm.gov.my/index.html notified by abaywashere http://www.zone-h.org/mirror/ id/18680536 http://saudemental.ibict.br/ asp/EscCatRelSuper.asp notified by XMORS DIGITAL SECURITY TEAM http://www.zone-h.org/mirror/ id/18531900 http://yazmalar.mk.gov.tr notified by ZiyaretCi http://www.zone-h.org/mirror/ id/18531923 http://www.ihm.moh.gov.my// dphc.html notified by PhantomCrews http://www.zone-h.org/mirror/ id/18517826 http://www.riobranco.ac.gov. br/v4/ notified by AL.MaX HaCkEr http://www.zone-h.org/mirror/ id/18527787 http://www.ilpsdk.gov.my/n3/ tidakdikenali.php notified by weareunknown http://www.zone-h.org/mirror/ id/18529105 http://www.price.moc.go.th/ index.html notified by Ashiyane Digital Security Team http:/...

#ZoneH Defacements 28/10/2012 ( #Hack #Website #Deface )

Zone-H Defacements 28/10/2012 http://www.pkdcity.go.th notified by wesker Hacker http://www.zone-h.org/mirror/ id/18509842 http://www.esechitaraque.gov. co notified by malware http://www.zone-h.org/mirror/ id/18509961 http://www.mairie-chateau- landon.fr notified by Kzsg http://www.zone-h.org/mirror/ id/18512606 http://ntprcc.gov.vn notified by Micky http://www.zone-h.org/mirror/ id/18513826

East Asian Hackers vs East European Hackers

Hackers exist in most countries of the world, but as we can clearly see from their campaigns, they each have their own way of operating. Experts from Trend Micro have published a paper in which they detail the differences between hackers from Eastern Europe and ones from East Asian countries. Entitled Peter the Great vs. Sun Tzu – Peter the Great was a Russian tsar and Sun Tzu was a Chinese military general – the study focuses on the threats posed by these actors to organizations, particularly ones from the US.   The first noteworthy observation made by the experts focuses on the malicious tools used by these cybercriminals. Hackers from Eastern Europe use sophisticated custom-built malware, while the ones from Asia rely on simpler techniques and off-the-shelf malware. The first noteworthy observation made by the experts focuses on the malicious tools used by these cybercriminals. Hackers from Eastern Europe use sophisticated custom-built ...

Demonoid Starts Redirecting to Ads and Malware

It’s been nearly a week since Demonoid went down following a huge DDoS attack and still there is no sign that the site will return. If anything, the situation has worsened somewhat. The site’s main domain is now redirecting straight to an ad network serving up malware to unsuspecting visitors. Demonoid is one of the world’s largest and longest standing sites that not only indexes torrents, but also operates its own tracker. Although the site has a reasonable uptime record, there have been a few occasions where it has not only gone down, but has disappeared completely. We are currently in one of those periods. Last week the latest of Demonoid’s difficulties turned out to be caused by a massive DDoS attack which initially crippled the site and then took it completely offine. But while DDoS attacks usually stop after a point has been made or the attackers get bored, the Demonoid admin explained that he had more on his mind. “There might have been an attack from anothe...

Mac Trojan Fallout: Apple Security Glory Days Gone?

Apple's reputation as an unattractive target for malware writers changed when the Flashback trojan hit more than 600,000 Macs. But Windows security still looks worse. Alan Paller, director of research for the SANS Institute, wrote in the group's information security newsletter Tuesday that it was time "to memorialize Apple's arrival as a prime target of cybercrime, following its recent ascent into a trusted platform for enterprise computing."  As Paller notes, Macs now have business cred, due in no small part to Apple hitting a home run with both the smartphone and tablet form factors. Market researchers said the company's success with the iPhone and the iPad has driven more demand than ever for Apple's laptops, not least by business users, even if it means "bringing your own device" (BYOD). Another selling point of Macs is that they've been almost completely unscathed by the last decade's boom in malware.  Interest...

Kaspersky Lab a rezolvat misterul troianului Duqu

Troianul Duqu a dat mari bătăi de cap programatorilor ce lucrează la principalele aplicații antivirus. Cei de la Kaspersky Lab au rezolvat, împreună cu programatori din întreaga lume unul “dintre cele mai mari mistere care înconjurau troianul Duqu : identificarea unui sector de cod necunoscut din structura componentei Payload DLL”. Kaspersky Lab declară într-un comunicat de presă următoarele lucruri. În urma unui feedback consistent din partea comunităţii de programatori, experţii Kaspersky Lab au concluzionat că infrastructura Duqu este compilată în limbajul de programare „C”, cu ajutorul Microsoft Visual Studio 2008 şi a unor opţiuni speciale pentru optimizarea mărimii codului şi a dimensiunii liniilor. De asemenea, codul a fost scris folosind o extensie personalizată pentru combinarea programării de tip „object-oriented” cu limbajul C, denumită adesea „OO C”. Deşi nu există o explicaţie simplă pentru care limbajul OO C a fost utilizat în locul C++ în infrastructur...

Google Search te avertizează când ai calculatorul infectat

Un număr destul de mare de utilizatori ai serviciilor motorului de căutare Google sunt întâmpinaţi cu un  mesaj de avertizare , ce îi anunţă că PC-ul pe care îl folosesc este  infectat cu o aplicaţie de tip malware , capabilă să intercepteze conexiunea cu serverele companiei şi alte website-uri. Avertismentul cât se poate de serios este iniţiat chiar de inginerii Google, după ce aceştia au descoperit că o bună parte din căutările iniţiate de utilizatori sunt interceptate şi redirecţionate printr-o serie de  servere proxy . Deşi motivul exact nu este cunoscut, este speculat că o aplicaţie malware este responsabilă de acest comportament, scopul fiind probabil furtul de informaţii de la utilizatori, cum ar fi  parole de acces  sau informaţiile de identificare ale cardului de credit. Deoarece Google poate detecta doar anumite anomalii care dau suspiciunea unei posibile infecţii, utilizatorii sunt îndemnaţi să asigure buna funcţionare a soluţiei  antivirus ...