Posts Tagged With: Malware

Target data hack only the beginning of massive, sophisticated attack…..


The Target data breach may be just the tip of the iceberg in what seems to be a massive sophisticated attack on U.S. retailers that may have possibly originated in Russia, according to newly discovered evidence. The Wall Street Journal reports that federal and private investigators who are looking into the matter have discovered that parts of the malware used to hit Target has been available on the black market since last spring, and was written in Russian, leading them to believe the attack may have ties to organized crime in the former Soviet Union.

The investigators have also revealed that any known antivirus software couldn’t detect the malware used, with hackers having also added in features that covered the fact that they were actually copying data from the credit and debit cards swiped in point-of-sale (POS) machines. Interestingly, the malware was programmed to steal data during prime business hours (i.e from 10:00 a.m. to 5:00 p.m. local time) and store it on an internalTarget server that was also controlled by the hackers.

“What’s really unique about this one is it’s the first time we’ve seen the attack method at this scale,” iSight Partners senior vice president Tiffany Jones said. “It conceals all the data transfers. It makes it really hard to detect in the first place.”

Some of these newly revealed details confirm what a recent Krebs on Security report said, although we’re now getting a better idea of the scope of the Target attack. Neither Krebs on Security, nor the investigators cited by the Journal have revealed how the malware was actually injected into Target’s POS machines.

iSight on Thursday issued its own report on the KAPTOXA (name of program written in Russian) POS malicious software it discovered, acknowledging the fact that it’s investigating the matter with the U.S. Secret Service. The security company warns retailers that the malware “has potentially infected a large number of retail information systems,” and they should contact the Secret Service and the company in case they believe they were infected. The security firm also advises consumers to keep an eye for fraudulent bank transactions and to avoid opening any emails or links that may have been sent by their banks or financial institutions, and instead contact those institutions via telephone or website.

Finally, Reuters on Friday exclusively reported that six ongoing attacks similar to the one suffered by Target have discovered by security firm IntelCrawler, although actual names of the companies involved were not revealed at the time this article was written.

Advertisements
Categories: Identity Theft Protection, Strange News, Uncategorized | Tags: , , , , , , , , , | Leave a comment

Learn Lottery Secrets, Blackjack software, win more often


1000_dollar_bill
THE MONEY TREE will help you with the latest software for increasing your odds on all the Lottery Tickets, Home Business start-ups, On-Line Blackjack winning software, SEO Tools, web site/blog search engine submitters (FREE) and much more.
Join all the others who have begun to turn losing tickets into winners.
Click the banner button below to start winning!!

 

temp733811016up

Categories: Uncategorized | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Get ready for Spring Selling….


You should get started now with your own home business, on-line or run your own home sales. Check out all that is available to get you started.
http://thewinnersite.com

Categories: Uncategorized | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

PC/Laptop tune up and repair programs now added:


Pile-of-100-dollar-bills-jpg
=============================================================================
The Money Tree brings you the best software for winning at the Lottery, casino Blackjack,Home Business start-ups and PC/Laptop tune up and repair programs. Stop fighting the odds on your favorite Lottery and get the odds in your favor for more Winning Tickets.
Learn the secrets of Blackjack and take home more money than you thought possible.
The time is right to set up your own Home Business, either on-line or at the flea market, yard sales, church sales or in your club.
Check out all that is available for you now:

http://thewinnersite.com

Categories: Home Business Opportunity, Uncategorized | Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | 1 Comment

New Malware Attacks Smartphone, Computer to Eavesdrop……turns on your microphone


A recently discovered new form of Android malware called DroidCleaner can not only infect your smartphone, but also targets your PC to spy on you.
Researchers at the security firm Kaspersky Labs have uncovered new malware which poses as a “cleaner” app — or an app used to free memory on Google’s OS — in the Google (GOOG) Play app store. Once an Android user downloads the app, the malware infects the user’s smartphone and can also be uploaded to the user’s PC if they plug the device into their Windows computer in the USB drive mode.
While the malware that attacks the smartphone is more sophisticated than the malware that infects the PC, according to Kaspersky, the primary function of the malware that installs on the computer is pretty invasive.
The malware that runs on an infected user’s PC can take control of the microphone on the machine and use it to eavesdrop. As soon as the microphone detects sound, it can begin to record the audio and then send it back to cyber criminals.
Kaspersky points out, however, that if a user has a current version of Microsoft (MSFT) Windows, then the function that automatically allowed the malware to be installed will not work because the setting is disabled on current versions. The PC attack is really focused at users that are using older versions of Microsoft Windows.
As for the malware installed on a user’s smartphone, Kaspersky researcher Victor Chebyshev said in a blog post that it was the first time his firm has seen “such an extensive feature set in one mobile application.”
Some of the functions the malware can perform on an infected device include:
Sending SMS messages
Enabling Wi-Fi
Gathering information about the device
Opening arbitrary links in a browser
Uploading the SD card’s entire contents
Uploading all SMS messages
Deleting all SMS messages
Uploading all the contacts/photos/coordinates from the device master

Categories: Identity Theft Protection, Strange News, Uncategorized | Tags: , , , , , , , | Leave a comment

WARNING..NEW RANSOM VIRUS….For PC Virus Victims, Pay or Else


94486878-jpg_203612
=============================================================================
Kidnappers used to make ransom notes with letters cut out of magazines. Now, notes simply pop up on your computer screen, except the hostage is your PC.
In the past year, hundreds of thousands of people across the world have switched on their computers to find distressing messages alerting them that they no longer have access to their PCs or any of the files on them.
The messages claim to be from the Federal Bureau of Investigation, some 20 other law enforcement agencies across the globe or, most recently, Anonymous, a shadowy group of hackers. The computer users are told that the only way to get their machines back is to pay a steep fine.
And, curiously, it’s working. The scheme is making more than $5 million a year, according to computer security experts who are tracking them.
The scourge dates to 2009 in Eastern Europe. Three years later, with business booming, the perpetrators have moved west. Security experts say that there are now more than 16 gangs of sophisticated criminals extorting millions from victims across Europe.
The threat, known as ransomware, recently hit the United States. Some gangs have abandoned previously lucrative schemes, like fake antivirus scams and banking trojans, to focus on ransomware full time.
Ransomjp2-popup-jpg_202645
=================================================================================
Sometimes victims get a message accusing them of breaking the law and demanding a fine. (Courtesy: NYTimes)
Essentially online extortion, ransomware involves infecting a user’s computer with a virus that locks it. The attackers demand money before the computer will be unlocked, but once the money is paid, they rarely unlock it.
In the vast majority of cases, victims do not regain access to their computer unless they hire a computer technician to remove the virus manually. And even then, they risk losing all files and data because the best way to remove the virus is to wipe the computer clean.
It may be hard to fathom why anyone would agree to fork over hundreds of dollars to a demanding stranger, but security researchers estimate that 2.9 percent of compromised computer owners take the bait and pay. That, they say, is an extremely conservative estimate. In some countries, the payout rate has been as high as 15 percent.
That people do fall for it is a testament to criminals’ increasingly targeted and inventive methods. Early variations of ransomware locked computers, displayed images of pornography and, in Russian, demanded a fee — often more than $400 — to have it removed. Current variants are more targeted and toy with victims’ consciences.
Researchers say criminals now use victims’ Internet addresses to customize ransom notes in their native tongue. Instead of pornographic images, criminals flash messages from local law enforcement agencies accusing them of visiting illegal pornography, gambling or piracy sites and demand they pay a fine to unlock their computer.
Victims in the United States see messages in English purporting to be from the F.B.I. or Justice Department. In the Netherlands, people get a similar message, in Dutch, from the local police. (Some Irish variations even demand money in Gaelic.) The latest variants speak to victims through recorded audio messages that tell users that if they do not pay within 48 hours, they will face criminal charges. Some even show footage from a computer’s webcam to give the illusion that law enforcement is watching.
The messages often demand that victims buy a preloaded debit card that can be purchased at a local drugstore — and enter the PIN. That way it’s impossible for victims to cancel the transaction once it becomes clear that criminals have no intention of unlocking their PC.
The hunt is on to find these gangs. Researchers at Symantec said they had identified 16 ransomware gangs. They tracked one gang that tried to infect more than 500,000 PCs over an 18-day period. But even if researchers can track their Internet addresses, catching and convicting those responsible can be difficult. It requires cooperation among global law enforcement, and such criminals are skilled at destroying evidence.
Charlie Hurel, an independent security researcher based in France, was able to hack into one group’s computers to discover just how gullible their victims could be. On one day last month, the criminals’ accounting showed that they were able to infect 18,941 computers, 93 percent of all attempts. Of those who received a ransom message that day, 15 percent paid. In most cases, Mr. Hurel said, hackers demanded 100 euros, making their haul for one day’s work more than $400,000.
That is significantly more than hackers were making from fake antivirus schemes a few years ago, when so-called “scareware” was at its peak and criminals could make as much as $158,000 in one week.
Scareware dropped significantly last year after a global clampdown by law enforcement and private security researchers. Internecine war between scareware gangs put the final nail in the coffin. As Russian criminal networks started fighting for a smaller share of profits, they tried to take each other out with denial of service attacks.
Now, security researchers are finding that some of the same criminals who closed down scareware operations as recently as a year ago are back deploying ransomware.
“Things went quiet,” said Eric Chien, a researcher at Symantec who has been tracking ransomware scams. “Now we are seeing a sudden ramp-up of ransomware using similar methods.”
Victims become infected in many ways. In most cases, people visit compromised Web sites that download the program to their machines without so much as a click. Criminals have a penchant for infecting pornography sites because it makes their law enforcement threats more credible and because embarrassing people who were looking at pornography makes them more likely to pay. Symantec’s researchers say there is also evidence that they are paying advertisers on sex-based sites to feature malicious links that download ransomware onto victims’ machines.
“As opposed to fooling you, criminals are now bullying users into paying them by pretending the cops are banging down their doors,” said Kevin Haley, Symantec’s director of security response.
More recently, researchers at Sophos, a British computer security company, noted that thousands of people were getting ransomware through sites hosted by GoDaddy, the popular Web services company that manages some 50 million domain names and hosts about five million Web sites on its servers.
Sophos said hackers were breaking into GoDaddy users’ accounts with stolen passwords and setting up what is known as a subdomain. So instead of, say, http://www.nameofsite.com, hackers would set up the Web address blog.nameofsite.com, then send e-mails to customers with the link to the subdomain which — because it appeared to come from a trusted source — was more likely to lure clicks.
Scott Gerlach, GoDaddy’s director of information security operations, said it appeared the accounts had been compromised because account owners independently clicked on a malicious link or were compromised by a computer virus that stole password credentials. He advised users to enable GoDaddy’s two-step authentication option, which sends a second password to users’ cellphones every time they try to log in, preventing criminals from cracking their account with one stolen password and alerting users when they try.
One of the scarier things about ransomware is that criminals can use victims’ machines however they like. While the computer is locked, the criminals can steal passwords and even get into the victims’ online bank accounts.
Security experts warn to never pay the ransom. A number of vendors offer solutions for unlocking machines without paying the ransom, including Symantec, Sophos and F-Secure. The best solution is to visit a local repair shop to wipe the machine clean and reinstall backup files and software.
“This is the new Nigerian e-mail scam,” Mr. Haley said. “We’ll be talking about this for the next two years.”

Categories: Strange News, Uncategorized | Tags: , , , , , , , , , , , , , , | Leave a comment

FREE programs for my readers…speed up, clean up your Laptop and Desktop….


Good morning,
I am always searching for FREE programs to clean up, speed up and optimize my PC and laptop. A lot of programs cost you money, but there is no need as there are very good programs out there that are recommended by Consumer Electronics and the Internet Guru’s that will preform the same job.
Here are two that I found this weekend, both are rated SAFE by virus programs (unless your anti-virus program is not up to date, which means you need to update your anti-virus) and I downloaded both this weekend and am currently using them.
NOTE:..check your hard drive (Drive C) or do a file/folder search for the following: pgbleach
This is a file created by Norton if you have the automatic restore point set to “ON”..you only need to keep the last one…I had nearly 300 on my hard drive, each one was taking up 500,000 mb of space…I recovered over 40% of my hard drive by deleteing these excess files.
I will include the links and basic instructions for how to use them, NOTE that the first time it will take up to two (2) hours for both to do their job.
The first one is FixBee Disk Optimizer and the second one is Eusing Registry Cleaner.
If you are an average user on the Internet (2 to 4 hours a day) you will only need to run these every 3 to 4 months or so. If you are a heavy user as I am, you should run them once a week or at least every 10 days.
I have already noted an increase of speed on both my laptop and desktop since using the instructions below…I am sure you will too.

Links:
FixBee Disk Optimizer
http://www.downloadcrew.com/article/27247-fixbee_disk_optimizer

Eusing Registry Cleaner
http://www.eusing.com/free_registry_cleaner/registry_cleaner.htm

Here is the best method for using the first time.
1. Run your Windows Defragmentor (you should do this every 4 to 6 months anyway depending on how much you use your desktop or laptop.

2. Run the Fixbee Optimizer…run both programs.

3. Run the Eusing Registry Cleaner.

4. Re-start your windows program (Re-boot)

Categories: Uncategorized | Tags: , , , , , , , , | 3 Comments

New malware sends your friends death threats through your email account…


If your sweet old grandmother sends you an email threatening to slit your throat, don’t worry: It’s just the malware talking. NBC’s TechNewsDaily reports that there’s a new strain of malware going around in Japan that takes control of users’ email accounts and uses them to send out death threats to a variety of targets. In fact, the malware is apparently so convincing that three people in Japan so far have been arrested because their email accounts have sent out death threats they didn’t write.
Among other things, Japanese authorities have seen the malware send out an email that “threatened to kill en masse at a shopping center,” “an email sent to an airline” that “threatened to bomb a plane” and an email sent to a “school attended by a member of the Japanese royal family” that “threatened harm against the kindergarten class.”
While this is all horrible, Symantec says that the malware’s “infection appears to be very limited at this time and the broader population of Internet users should be not affected.” Symantec also says that its own Insight reputation-screening software was capable of protecting its users from the malicious code.

Categories: Uncategorized | Tags: , , , , , , , , | Leave a comment

Skype targeted by ‘worm’ malware infecting Windows PCs……


 

Skype, the internet communications platform, is being used by hackers to distribute a “worm” that infects Windows PCs.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

When users click on an instant message saying “lol is this your new profile pic?” they unwittingly download a file containing a Trojan horse malware file.

This opens a backdoor allowing hackers to hijack infected PCs and recruit them into a “botnet army”.

Users can be locked out of their machines and held to ransom.

According to internet security specialist Sophos, the worm is a variant of the well-known “Dorkbot” worm which has been spread by social media platforms such as Facebook and Twitter.

When the worm infects a computer it sends out the “lol” message to the user’s contact list.

Unsuspecting recipients think the message has originated from someone they know and click on the link, thereby downloading the malware payload.

Hijacked computers

Skype said in a statement: “Skype takes the user experience very seriously, particularly when it comes to security. We are aware of this malicious activity and are working quickly to mitigate its impact.

“We strongly recommend upgrading to the newest Skype version and applying updated security features on your computer.

“Additionally, following links – even when from your contacts – that look strange or are unexpected is not advisable.”

Botnets are often used to mount distributed denial of service (DDoS) attacks – forcing websites offline – to run spyware or to send out spam emails.

Publicity about the threat has made many users wary of clicking on strange-looking links posted via social networks, which may have prompted the perpetrators of this latest attack to switch tactics.

“The danger is, of course, that Skype users may be less in the habit of being suspicious about links sent to them than, say, Facebook users,” said Sophos’s senior technology consultant Graham Cluley.

Categories: Strange News | Tags: , , , , , , , , | Leave a comment

Identity Protection for you and your computer


New spyware, malware and trojans are coming out everyday to steal your personal information. You need to protect yourself with the most up to date software to remove and secure your ID and computer.

Spyhunter 4
http://tinyurl.com/bwofgrk

Google redirect virus Protection
http://tinyurl.com/bm3neeq

Fix Windows Errors Optimize PC
Fix System Errors
Improve Startup
Clean Registry
Defrag Disk
Optimize System Settings
http://tinyurl.com/cjh2gql

Categories: Identity Theft Protection, Uncategorized | Tags: , , , , , | Leave a comment

Blog at WordPress.com.

hocuspocus13

Magickal Arts

sharia unveiled

illuminating minds

mayanexplore.com

Riviera Maya Travel Guide

That's How He Rolls

A 100% grassroots effort to fund a wheelchair van for Jaime

Cajun Food, Louisiana History, and a Little Lagniappe

Preservation of traditional River Road cuisine, Louisiana history & architecture, and the communities between Baton Rouge & NOLA

Jali Wanders

Wondering and Wandering

politicalconnection

Connecting the world to Truth, so that Justice can be served

Tourism Oxford. Click "New Blog Home" in menu for our new website

Visit our blog at its new home http://www.tourismoxford.ca/blog

Southpaw Tracks

“If ever a time should come, when vain and aspiring men shall possess the highest seats in Government, our country will stand in need of its experienced patriots to prevent its ruin.” ~Samuel Adams

Pacific Paratrooper

This WordPress.com site is Pacific War era information

Biblical Archaeology

The history and archaeology of the Bible

what's the formula?

Nurturing awesomeness: from the parents of celebrities, heroes, trailblazers and leaders

Digging History

Metal Detecting, History, Birds, Animals, Fylde Coast, River Ribble and more....

River's Flow

Combat Vets for Combat Vets www.riversflow.net

My Encore Life In Focus

Life is a bowl of photos

Tarheel Red

A Voice of Conservatism Living in Carolina Blue

cancer killing recipe

Just another WordPress.com site

%d bloggers like this: