Results 1 to 10 of 1320

Thread: SPAM frauds, fakes, and other MALWARE deliveries...

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #34
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Thumbs down Fake 'Voice Mail' SPAM ...

    FYI...

    Fake 'Voice Mail' SPAM
    - http://blog.dynamoo.com/2014/09/acco...-have-new.html
    23 Sep 2014 - "This strangely titled spam leads to malware.
    From: Voice Mail
    Date: 23 September 2014 10:17
    Subject: You have a new voice
    You are receiving this message because we were unable to deliver it, voice message did not go through because the voicemail was unavailable at that moment.
    * The reference number for this message is _qvs8213783583_001
    The transmission length was 78
    Receiving machine ID : R8KU-UY0G3-ONGH
    To download and listen your voice mail please follow the link ...
    The link to this secure message will expire in 24 hours ...


    The link in the email downloads a file from www .ezysoft .in/ocjnvzulsx/VoiceMail.zip which contains a malicious executable VoiceMail.scr which has a VirusTotal detection rate of 2/54*. According to this Anubis report** the malware attempts to phone home to very-english .co.uk which might be worth blocking."
    * https://www.virustotal.com/en-gb/fil...is/1411464313/

    ** http://anubis.iseclab.org/?action=re...7a&format=html

    - http://myonlinesecurity.co.uk/new-vo...e-pdf-malware/
    23 Sep 2014 - "... 23 Sep 2014: VoiceMail.zip (9kb): Extracts to: VoiceMail.scr Current Virus total detections: 2/54*
    * https://www.virustotal.com/en-gb/fil...is/1411464313/
    ___

    jQuery.com compromised to serve malware via drive-by download
    - http://www.net-security.org/malware_news.php?id=2869
    23.09.2014 - "jQuery.com, the official website of the popular cross-platform JavaScript library of the same name, had been compromised and had been -redirecting- visitors to a website hosting the RIG exploit kit and, ultimately, delivering information-stealing malware. While any website compromise is dangerous for users, this one is particularly disconcerting because of the demographic of its users... The attack was first detected on September 18, and given that the malicious redirector was hosted on a domain that was registered on the same day, it's more than likely that that was the day when the attack actually started. RiskIQ researchers* have immediately notified the jQuery Foundation about the compromise, and the site's administrators have -removed- the malicious script. The bad news is that they still don't know how the compromised happened, so it just might happen again. Users who have visited the site on or around September 18 are advised to check whether they have been compromised by the malware. The researchers recommend immediately re-imaging of the system, resetting passwords for user accounts that have been used on it, and checking whether suspicious activity has originated from it (data exfiltration, etc.). The only good news in all of this is that there is no indication that the jQuery library was affected."
    * http://www.riskiq.com/resources/blog...-accounts-risk

    >> https://blog.malwarebytes.org/?s=RIG+exploit+kit

    - https://isc.sans.edu/diary.html?storyid=18699
    2014-09-23

    46.182.31.77: https://www.virustotal.com/en/ip-add...7/information/
    ___

    Nuclear Exploit Kit evolves, includes Silverlight Exploit
    - http://blog.trendmicro.com/trendlabs...light-exploit/
    Sep 23, 2014 - "... We observed that the Nuclear Exploit Kit exploit kit recently included the Silverlight exploit (CVE-2013-0074*) in its scope. We believe that the attackers behind the Nuclear Exploit Kit included Silverlight in its roster of targeted software for two reasons: to have an expanded attack surface and to avoid detection (as not many security solutions have detections for this particular exploit)... This particular exploit has also been used in other exploit kits, such as the Angler Exploit Kit... Microsoft has released a bulletin (Microsoft Security Bulletin MS13-022) to address the associated vulnerability... The number of exploits used by the kit has -doubled- since the start of 2014...
    Timeline of exploits used by the Nuclear Exploit Kit:
    > http://blog.trendmicro.com/trendlabs...imeline-01.jpg
    Vulnerabilities targeted by the current Nuclear Exploit Kit:
    > http://blog.trendmicro.com/trendlabs...ploit_fig4.png
    ... patches have already been released for the vulnerabilities targeted by the Nuclear Exploit Kit..."
    * https://web.nvd.nist.gov/view/vuln/d...=CVE-2013-0074 - 9.3 (HIGH)

    Last edited by AplusWebMaster; 2014-09-24 at 14:40.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •