Tag Archive | "trojan"


16 November 2013 | 3,067 views

Linux Backdoor Fokirtor Injects Traffic Into SSH Protocol

Earlier this week we wrote about an Internet Explorer 0-day which used an in-memory drive by attack, which was pretty smart. Now another new type of malware (a backdoor in this case), this time targeting Linux known as Fokirtor. There is no real discussion of the exploit used to plant this backdoor (if it was [...]

Continue Reading


25 January 2011 | 14,745 views

Digital Underground Offering Cheap Botnets For Hire

Perhaps even the cyber-criminals are effected by the recent recession – botnets for hire are hitting rock-bottom rates starting at just $2. We reported back in April 2010 about the Texas Man Who Pleaded Guilty To Bot Network For Hire. They are becoming more multi-talented as well rather than just offering bot networks for DDoS [...]

Continue Reading


17 January 2011 | 10,704 views

China Facing Problems With Android Handsets & Pre-installed Trojans

It seems like the Chinese are always coming up with inventive ways to scam people, this time the people in their own country. Android is of course growing quickly globally and China is no exception with the availability of cheap hardware there the open-source Android OS is a natural choice. The latest scam is some [...]

Continue Reading


09 March 2010 | 9,130 views

Energizer Duo USB Battery Charger Software Has Backdoor Trojan

There has been a number of interested stories lately especially related to hardware, the latest doing the rounds is this one where a seemingly innocuous USB battery charger has been installing some nasty remote control software onto users systems. The charger at fault is the Energizer Duo USB Battery Charger, you’re only at risk if [...]

Continue Reading


09 November 2009 | 8,029 views

Facebook Used By Whitewell Trojan To Communicate

Facebook has had it’s fair share of security woes and the latest is the discovery of a new Trojan that uses Facebook to communicate. Interesting that it’s using the Facebook notes feature to communicate depending on title/subject of the note. The actual malware itself is spread through doc/pdf exploits and not through any flaws in [...]

Continue Reading


05 November 2009 | 10,973 views

Windows 7 UAC (User Access Control) Ineffective Against Malware

There have been a few stories about Windows 7, even one about Windows 7 UAC before and now it’s officially on sale I’d expect there to be many more. As always malware and mass infections is a numbers game so the bad guys will always target the most popular and prolific operating systems to increase [...]

Continue Reading


18 September 2009 | 77,268 views

Nasty Trojan Zeus Evades Antivirus Software

This is one nasty piece of malware, seems like it’s working on a low level as per rootkits, there aren’t many technical details but it may well be operating on a Ring 0 level. The level of detection by AV software is quite scary, especially since the malware is specifically targeting bank login details and [...]

Continue Reading


14 May 2009 | 22,258 views

Trojan in Counterfeit Copies of Windows 7 Builds Botnet

This latest mass infection is through a vector I really don’t understand, see as though you can legitimately download Windows 7 from Microsoft. I guess people just prefer BitTorrent downloads to HTTP downloads, and whoever had this smart idea capitalized on that. Microsoft should perhaps do something about that and put out a legitimate BitTorrent [...]

Continue Reading


13 January 2009 | 3,803 views

Fake CNN Site From Phishing E-mail Serves Trojan

The latest Phishing E-mails going round are leveraging on people’s need to digest the latest information, in this case about the Israel-Hamas conflict. They set up a fake CNN site which prompts you to upgrade your flash player to view the video, of course it’s not Flash but a Trojan targeting your sensitive financial information. [...]

Continue Reading


01 December 2008 | 3,802 views

Malware Researchers Discover Rootkit HKTL-BRUDEVIC Similar to Sony CD Malware

You might remember the Sony BMG Rootkit fiasco back in 2006 when the whole Internet was up in arms about Sony installing a rootkit in the name of Digital Restriction Rights Management. Another piece of malware has been uncovered that has been linked to Sony and their Fingerprint reader. Researchers have unearthed rootkit-like functionality in [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·