Tag Archive | "trojans"


16 July 2009 | 11,309 views

Chinese Company Shares Huge Malware Database

We need more companies like this that acknowledge hoarding data isn’t doing anything for the greater good, to really stamp out the core problems you have to share the data you’ve correlated across the World so everyone can put together what they have and do something about it. It seems like with China pumping out [...]

Continue Reading


05 May 2009 | 5,235 views

Torpig Botnet Hijacking Reveals 70GB Of Stolen Data

We did mention Torpig in passing back in January 2008 when talking about the Mebroot rootkit which digs down deep into the Master Boot Record. It seems like Torpig has been pretty active since then and the latest break is that some security researchers have managed to infiltrate the botnet and collect some data on [...]

Continue Reading


06 April 2009 | 9,556 views

How to Scan for Conficker Worm

A bit of an update to the conficker worm that is supposedly scheduled for new updates and instructions today wednesday 1st. April 2009 and that nobody except for the bad guys knows what those instructions would be. Fyodor has rolled out a new nmap beta release to the nmap scripting engine that enables it to [...]

Continue Reading


15 January 2009 | 12,043 views

Next-Gen Botnets Taking The Place of Storm and Srizbi

Back in November there was a considerable drop in Spam when Spam friendly ISP McColo was cut off from the Internet by it’s upstream peer. Srizbi worm was pretty smart though and was picking up again by the end of November. Later in the year the botnets were somewhat neutralised leading to a huge drop [...]

Continue Reading


26 November 2008 | 3,576 views

Spam Back on the Rise with Srizbi Resurrected

After McColo was partially disconnected from the Internet by it’s peers global spam dropped noticeably. It seems however that the spam was emanating from a zombie network and the control servers were hosted by McColo, the creators of the botnet (Srizbi) were smart about it though and built a fail-safe system into the the malware. [...]

Continue Reading


31 October 2008 | 4,515 views

Morris Worm To Turn 20 – How Far Things Have Come

Robert Tappan Morris is a character of Internet lore, anyone who has studied Computer Science, Software Engineering or Computer Security will have heard of this guy. He’s pretty much the fellow that made the Internet famous (for all the wrong reasons) and the first creator of a bit of self-replicating network based malware (now known [...]

Continue Reading


03 September 2008 | 3,708 views

Productive Botnets

We all know what botnets are (think so), but anyway let’s see a proper definition of botnets taken from shadowserver… and I quote: A botnet is a collection of computers, connected to the internet, that interact to accomplish some distributed task. Although such a collection of computers can be used for useful and constructive applications, [...]

Continue Reading


23 June 2008 | 6,698 views

Botmaster Robert Matthew Bentley AKA LSDigital Sentenced

Another one bites the dust with another reasonably hefty sentence, this time a botherder or botnet master. Just under 4 years and a big chunk of change as a fine, I guess he probably has plenty of cash stashed somewhere though. These guys can really rake it in with their mass infectors of doom. A [...]

Continue Reading


10 June 2008 | 12,717 views

Virus Variant Extorts You by Encrypting Your Files

Malware authors are getting sneaky again, in the latest turn of events they have started encrypting your files and holding them at ransom! You have to pay up to get the ‘decryptor’ and get access to your files again. This is pretty dangerous…and cunning too. It’s not easily broken either, they are using RSA 1024-bit [...]

Continue Reading


22 May 2008 | 3,584 views

Spammers Target Social Networking Sites

It makes sense, spammers will follow whatever is popular, wherever the social mass is at and reading they will bombard. In the earlier days Myspace was a big target, now they are moving on to other sites such as Facebook. Social networking sites are an ideal place for spammers as they can exploit the trust [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·