Showing posts with label Malware. Show all posts
Showing posts with label Malware. Show all posts

Monday, March 31, 2014

[securelist] Caution: Malware pre-installed!

China’s leading TV station, CCTV, has a long-standing tradition of marking World Consumer Rights Day on March 15 with its ‘315 Evening Party’. The annual show makes a song and dance about consumer rights violations. This year’s party reported on cases where smartphone distribution channels pre-install malware into Android mobiles before selling them on to unwitting customers.

Wednesday, March 19, 2014

[net-security] 20% of all malware ever created appeared in 2013

According to the latest PandaLabs report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day.

Friday, March 14, 2014

[securityintelligence] DIY: Android Malware Analysis – Taking Apart OBAD (Part 2)

Let’s give OBAD a run

Last time we discussed about various tools for analysis, setting up the app to be debugged in jdb, identifying anti-emulator code, hacking and compiling AOSP code and then running the emulator with our modified system image to bypass antivm check. So now that you can bypass the anti vm checks, if you run OBAD in the emulator you would see it asking for enabling it as a DeviceAdmin

[securityintelligence] DIY: Android Malware Analysis – Taking Apart OBAD (Part 1)

I plan on writing regular posts in the DIY series with the goal of not only understanding malware, vulnerabilities and exploits but also to share with our readers some techniques and tools they can use themselves to “know the enemy”. I am also looking forward to hearing about your experiences in analyzing similar threats with similar or more efficient tools & techniques.

Friday, February 14, 2014

[infosecurity-magazine] Apps on Google Play Can Secretly Subscribe Users to Premium SMS Services

Traditional advice is to use the official app stores to avoid mobile malware – but a Spanish security firm has discovered four apps available via Google Play that scam their users into covertly subscribing to premium SMS services and stealing money through their phone bills.

[computerweekly] Top banking botnets study victims' behaviour, Dell report reveals

Five of the top eight banking Trojans can capture snapshots of victims’ behaviour, according to a research report from Dell Secureworks.
The malware does not just capture bank details and login credentials, but also helps attackers build up a picture of user behaviour and interactions with banking sites.

Wednesday, February 12, 2014

[cert] Prioritizing Malware Analysis

Hi, this is Jose Morales, researcher in the CERT:CES team. In early 2012, a backdoor Trojan malware named Flame was discovered in the wild. When fully deployed, Flame proved very hard for malware researchers to analyze. In December of that year, Wired magazine reported that before Flame had been unleashed, samples of the malware had been lurking, undiscovered, in repositories for at least two years. As Wired also reported, this was not an isolated event.

[securityaffairs] JackPOS malware presented as a Java Update Scheduler

JackPOS was detected by security experts at IntelCrawler firm several days ago and it seemed based on code from “Alina”. Attacks on POS are on the rise.

Tuesday, February 11, 2014

[blackhat] BINARYPIG - SCALABLE MALWARE ANALYTICS IN HADOOP

PRESENTED BY

Over the past 2.5 years Endgame received 20M samples of malware equating to roughly 9.5 TB of binary data. In this, we’re not alone. McAfee reports that it currently receives roughly 100,000 malware samples per day and received roughly 10M samples in the last quarter of 2012 [1]. Its total corpus is estimated to be about 100M samples. VirusTotal receives between 300k and 600k unique files per day, and of those roughly one-third to half are positively identified as malware [2].

Monday, February 10, 2014

[trendmicro] Trend Micro threat defense experts assist FBI’s successful prosecution of “SpyEye” malware creator

0
Recent headlines are filled with details about the fallout from a record number of hacks, costing retailers and consumers millions. In the wake of all this negativity, we are pleased to share that Trend Micro’s Forward-looking Threat Research (FTR) Team provided “valuable assistance” in helping the Federal Bureau of Investigation (FBI) apprehend and successfully convict the creator of the “SpyEye” malware, which is believed to have infected an estimated 1.4 million computers in the United States and abroad. 

Sunday, February 9, 2014

[us-cert] Malware Targeting Point of Sale Systems

Original release date: January 02, 2014 | Last revised: February 05, 2014

Systems Affected

Point of Sale Systems

Overview

Point of Sale Systems

When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale (POS) systems. POS systems consist of the hardware (e.g. the equipment used to swipe a credit or debit card and the computer or mobile device attached to it) as well as the software that tells the hardware what to do with the information it captures.
When consumers use a credit or debit card at a POS system, the information stored on the magnetic stripe of the card is collected and processed by the attached computer or device. The data stored on the magnetic stripe is referred to as Track 1 and Track 2 data. Track 1 data is information associated with the actual account; it includes items such as the cardholder’s name as well as the account number. Track 2 data contains information such as the credit card number and expiration date.