1600 Burrstone Road, Utica, NY 13502
(315) 792-3006
webmanager@utica.edu

Tag: Malware

Malicious email that recipient is on “Prism watchlist” linked to just-uncovered espionage campaign

(SC Magazine) The group behind the “NetTraveler” espionage malware campaign is now sending emails claiming the recipient is on the “Prism” watch list, according to researchers. Prism is a recently outed U.S. surveillance program run by the National Security Agency that collects data from internet giants such as Google, Facebook and Apple. On Tuesday, the 9b+…
Read more

Source code for Carberp financial malware is for sale at a very low price, researchers say

IDG News Service — The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price, which could result in additional Carberp-based financial malware being developed in the future, according to researchers from Russian cybercrime investigations firm Group-IB. A person believed to be a…
Read more

Malware Alert: “Hey User Your Facebook Account Has Been Closed!”

(Softpedia) Security experts from Avast! have come across an interesting malware distribution spam campaign that exploits Facebook’s popularity.  It all starts with emails entitled “Hey <name> your Facebook account has been closed!” or “Hi <name> your Facebook account is blocked!” The bogus Facebook emails instruct users to download and execute an attachment to unlock their…
Read more

U.S., Russia to Share Cyberthreat Data

(Bank Info Security) The United States and Russia are creating a new working group to assess emerging online threats. The group, announced by the White House, will begin work within the next month. “It’s a great idea because cybercrime has long been assisted by cross-jurisdictional friction,” says Richard Stiennon, an IT security analyst who wrote…
Read more

USB Malware

(Infosec Institute) In this article the author, c0d3inj3cT, looks at malware that propagate to other machines using USB removable devices. Unlike most malware which make use of vulnerable Network Services to spread to other machines in the network, these malware are specifically designed to infect USB removable devices. c0d3inj3cT discusses in depth the methods used by…
Read more

Flash Player Clickjacking Flaw Allows Hackers to Hijack Your Webcam

(Softpedia) Back in October 2011, Adobe reported fixing a clickjacking issue in the online Adobe Flash Player Settings Manager. However, experts say that the flaw can still be leveraged, at least with some web browsers, to allow access to a user’s webcam and microphone. According to security researcher Egor Homakov, the exploit he has developed…
Read more

Cyberespionage Operators Work In Groups, Process Enormous Data Workloads

(Dark Reading) In a study of the lifecycle of cyberespionage attacks, a group of researchers at a Taiwanese security startup have found that the nation’s major government agencies encounter a dozen such attacks each day and that the operators behind the attacks have virtual data centers that appear to be processing enormous workloads. The research,…
Read more

FDA, facing cybersecurity threats, tightens medical-device standards

(Washington Post) The Food and Drug Administration is tightening standards for a wide range of medical devices — from fetal monitors used in hospitals to pacemakers implanted in people — because of escalating concerns that the gadgets are vulnerable to cybersecurity breaches that could harm patients. Increasingly, officials said, computer viruses and other malware are…
Read more

Zeus Money Mule Recruiting Scam Targets Job Seekers

(Threatpost) No one can say that hackers don’t have a sense of irony. In search of money mules, attackers behind a variant of the Zeus Trojan have configured the malware to activate when users visit careerbuilder[.]com with code that redirects victims to an advertisement for a mule-recruitment website. Researchers at Trusteer spotted the scheme in…
Read more

Was Microsoft’s takedown of Citadel effective?

(Naked Security) by James Wyke – As we mentioned last week, Microsoft recently fought back against more than 1,400 Citadel botnets by sinkholing their Command and Control (C&C) infrastructure. SophosLabs has been monitoring Citadel for some time, including individual botnets such as those targeting Canadian institutions, so I decided to take a closer look at…
Read more