Archive | Malware




Cyber Crime Toolkits Go On Sale

This is not exactly new news either, these kind of toolkits have been on sale for a long time, virus generators, trojan toolkits, now they are getting more polished, more stream-lined, more expensive and more easily available. News of them is hitting the mainstream media.. Malicious hackers are producing easy to use tools that automate […]

Tags: , , , , , ,

Posted in: Legal Issues, Malware | Add a Comment

Storm Worm Descends on Blogspot

It seems like spammers, scammers, phishers and now malware authors are starting to leverage blogs more and more, especially Blogger/Blogspot as Google tend to be quite slow in responding and sometimes don’t respond at all. This makes it an ideal platform for dodgy behaviour as the crooks have adequate lead time to con/infect people before […]

Tags: , , , , , , , , , , , ,

Posted in: Malware | Add a Comment

TimeWarner DNS Hijacking IRC Servers to Stop DDoS Attacks

An interesting happening this week, some ISP’s have been jacking the DNS entries for certain IRC networks to crack down on zombie/bot infections. Is it ethical? Should they be doing this to their users? I first got wind of this from a post on Full Disclosure mailing list from an IRC network administrator. You can […]

Tags: , , , , , , , , , ,

Posted in: Malware, Network Hacking | Add a Comment

Trojan Mimicks Windows Activation Interface – KardPhisher

Recently a new Trojan popped up that mimics the Windows activation interface, phishing for credit card details and even the PIN number. The Trojan itself isn’t particularly advanced technically, it’s mostly just a social engineering attack. Symantec is reporting on a Trojan horse that mimics the Windows activation interface. What they are calling Trojan.Kardphisher doesn’t […]

Tags: , , , , , , ,

Posted in: Malware, Social Engineering, Windows Hacking | Add a Comment

VBootkit Bypasses Vista’s Digital Code Signing

At Black Hat Europe (in Amsterdam) security experts from India (Nitin and Vipin Kumar of NV labs) demonstrated a special boot loader that gets around Vista’s code-signing mechanisms. Known as VBoot and launching from a CD and booting Vista it can make on-the-fly changes in memory and in files being read. In a demonstration, the […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Windows Hacking | Add a Comment

Google Acquires Web Security Startup GreenBorder

More Google News this week after Google Launches Online Security & Malware Blog, now they have acquired a web security startup called GreenBorder. Google Inc. said on Tuesday it has bought Internet security startup GreenBorder Technologies Inc., which creates secure connections to protect e-mail and Web users from malicious or unwanted computer code. Terms of […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Malware | Add a Comment

Bot Infections Surges to 1.2 Million

I have noticed an increase in Spam activity lately, especially in Spam blog comments there has been a noticeable surge in the frequency and number. That’s why we’ve implemented stricter measures against spammers on Darknet and our other sites. It seems there has been a big raise in the number of bot infected systems, so […]

Tags: , , , , , , , , ,

Posted in: Malware, Spammers & Scammers | Add a Comment

Smart Trojan Targets eBay Users

It seems like people that make malware are getting more specific nowadays, the are no longer writing random self-propagating worms or trojans just for the sake of knowledge or notoriety. Far more common nowadays is malware for specific purposes to capture login or banking details for certain sites or organisations. This time it’s a custom […]

Tags: , , , , , , , ,

Posted in: Malware, Web Hacking, Windows Hacking | Add a Comment

Up to a Quarter of Internet Connected Machines Could be Zombies

It’s a scary thought to find out perhaps a quarter of Internet connected machines could be zombies…The sad part is, I think it could well be true, as most of the non tech savvy Internet users I know still use Internet Exploder and their machines are riddled with crapware, trojans, viruses and spyware. Imagine how […]

Tags: , , , , , , , ,

Posted in: General News, Malware | Add a Comment

MSN Password Stealing Trojan Becomes Public

Ah another trojan, this time targeting MSN Live logins for. The trojan has been made public by some kind citizen calling himself “Our Godfather” on the BitTorrent network. The sad thing is…I guess it works and hundreds of people will have installed it. Malware designed to steal users’ Windows Live Messenger password has been released […]

Tags: , , , , , , , , , ,

Posted in: Malware, Windows Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·