Blog

Online Ad Campaigns Mimicking as the CryptoLocker

 March 10, 2014

Estimated reading time: 3 minutes

CryptoLocker is a recently discovered Windows malware that encrypts user data and makes it unusable. It demands the user for a certain amount of money (ransom) to decrypt the data. As of December, 2013, the creators of CryptoLocker were able to pull in $30 million in just 100 days. So,...

CryptoLocker – the New Ransomware on the Loose

 September 23, 2013

Estimated reading time: 3 minutes

Previously we had reported about the “FBI virus”. The virus locks the computer screen and stops the user from using the infected machine until they agree to pay a certain amount of money to the cybercriminal. Today, we will discuss a new entry in the list of file encrypting ransomware;...

Trojan.Cidox targets IPL( i mean Initial Program Loader )

 May 24, 2013

Estimated reading time: 2 minutes

IPL is now in news for different reasons. On the other side we see Initial Program Loader (IPL) – which is responsible for loading of Operating system is targeted by Trojan.Cidox. Although bootkit technology isn’t new, it plays an important role nowadays in attack scenarios against the Microsoft Windows platform....

‘Flamer’ Lights Fire In Cyber Space

 May 31, 2012

Estimated reading time: 3 minutes

We would like to update our readers about the findings of Flamer, the recent information stealing malware which is making news in Cyber Space. Investigation shows that a few of the malicious Flamer components were reported in the Online Scanner portal around 2 years and 10 months ago (in August...

Fake SMS Scams On Rise

  • 1
    Share
 August 9, 2011

Estimated reading time: 2 minutes

Fake SMS scams are on the rise over the last few months. Fraudsters are mass spamming mobile users with fake messages claiming that they have won some lottery or lucky draw from the UK. Below are some of the scam messages: BT.UK: YOUR GSM NO. HAS WON 500,000GBP IN BTELECOM...

Stealthy variant of Bootkit.Trup

 July 5, 2011

Estimated reading time: 2 minutes

The new variant of Bootkit.Trup is making rounds, which is updated to protect the infected MBR. The encryption used in Bootkit.Trup.B is very similar to its old variant “Bootkit.Trup.A” which is simple rotate right (ROR) operation. It gets Drive geometry of the infected disk and then calculates position near end...

foxnewspolitics Twitter account hacked

 July 4, 2011

Estimated reading time: 1 minute

Often times News channels compete to grab opportunity to show Breaking News. Ironically, few hours back @foxnewspolitics Twitter account is hacked. Hacker is using this account to post haox that US President Obama is assassinated. They have more than 34 thousand followers on this famous Social Networking site. Foxnews has...

CVE-2010-2568: LNK file automatically executes code in Control Panel shortcuts

 July 20, 2010

Estimated reading time: 2 minutes

Microsoft LNK files [MS-SHLLINK] which are now turned into auto executable files by malware authors using its undocumented feature is a hot topic on most of the security forums. We have received specially crafted LNK files along with Portable executable files having the mentioned LNK file vulnerability. When user visits...

Surviving PDF “/Launch” attack

 May 7, 2010

Estimated reading time: 2 minutes

After Didier Stevens revealed about PDF “/Launch” Social Engineering Attack that could be used to launch applications from PDF files, we have received malicious PDF files which use this technique -doc.pdf, Royal_Mail_Delivery_Invoice_[].pdf. These PDF files modify Adobe’s Launch File warning which is prompted to the user before opening embedded non-pdf...