Daily Bits

  • Home
  • About
  • Archives
  • Contact
  • Advertise

May 28, 2008 By Arun Leave a Comment

Security Update: May 28

Phishing Scam Themed On China Earthquake

These are times when the malware in your inbox can give you some idea of what’s happening in the world. Register points out that e-mail with infected word attachments are making the rounds.

E-mails contain the text:

BEIJING, May 20 (Xinhua) — The death toll from the earthquake in southwest China’s Sichuan Province has risen to 34,074 nationwide as of 2 p.m. Saturday, while 198,347 people were injured, according to the Information Office of the State Council. Pay attention to attachment for more.

Malware authors waste no time in crafting mails that seem to provide useful information relating to tragedies or natural disasters. The pattern has become noticeable in recent times and will be growing in future.

Security Threat At US Power Company

Security is not about just getting the right policies and tools in place. They have to be monitored and the policies enforced. The federal report on the Tennessee Valley Authority power company’s susceptibility to cyber attacks paints a grim picture about enforcing security policies.

An excerpt from TechWorld:

Shortcomings of its supervisory control and data acquisition (SCADA) network itself included misconfigured or inactivated firewalls, ineffective passwords, inconsistent configuration management and lack of virus protection, according to the report, “TVA Needs to Address Weaknesses in Control Systems and Networks.”

At a time when malware are scouring the web for exploitable sources, the control of critical infrastructure is the first point to be secured.

Trojan downloads on the rise

A report compiled by Microsoft on security breaches last year points to some serious trends in growth of malware.

An excerpt from News.com:

Of the malicious software attacks, there was a 300 percent increase in the number and proportion of Trojan downloaders and droppers that were detected and removed, according to the report.

Win32/Nuwar, also called the Storm Worm, is an example of a Trojan dropper. It arrives in an e-mail, enticing recipients to visit a Web site, and then installs a Trojan on the computer that provides back-door access. The worm has been continually updated to avoid detection and now more than half a million systems have been infected worldwide creating a botnet, the report says.

Also to be noted are that malware authors are increasingly looking at surreptitious complicated ways to extract sensitive data from the victims.

Another Wave Of Mass Javascript Infections

Seems that malware never have problems in picking from a range of unsecured sites to infect. This time its about 2,00,000 of them infected with a script that takes users to a video but requires a special codec to be downloaded.

An excerpt from Heise Security:

Users who download the “codec” not only get the Zlob Trojan, but also a DNSChanger that sets Windows DNS entries to fake servers which redirect requests for banking sites to the addresses of phishing sites. The phoney codec also downloads additional malicious baggage. Virus scanner detection is patchy. Avast, CA, Gdata, McAfee, NOD32, Panda and Symantec do not yet recognize the virus – more than a third of the virus scanners in the most recent c’t virus scanner test.

❮❮ Previous Post
Next Post ❯ ❯

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

Topics

  • Android Apps (27)
  • Apps (20)
  • Art (11)
  • Browsers (43)
  • Business (4)
  • Cloud Computing (3)
  • Funny Stuff (63)
  • Games (47)
  • General (633)
  • Health (17)
  • Infographic (5)
  • Internet (353)
  • iPad Apps (14)
  • iPhone Apps (43)
  • Media (103)
  • Mobile (197)
  • Music (5)
  • News (7)
  • Online Video (54)
  • Science (18)
  • Search Engines (39)
  • Security (68)
  • Social Networks (184)
  • Software (69)
  • Web 2.0 (43)
  • Web Tools (100)

Recently

  • 40 Web Tools to Speed Up Your Workflow in 2019
  • Thinking of Starting a Tech Company? Some Tips To Follow
  • Some Ideas To Spice Up Bathroom Décor
  • 3 Ways To Use Social Media To Help You Build Better Relationships With Clients
  • Understanding Capital Gains and Capital Assets For Tax Purposes

Tags

3D printing amazon android Android apps apple apps art cars DIY ebooks facebook Featured firefox gadgets Games google Infographics Internet iPad iphone iPhone app iPhone apps microsoft Mobile mobile phones mozilla music Privacy research robotics robots science science fiction Security social media social networking Social Networks Star Trek technology Twitter video games videos websites yahoo youtube

Copyright © 2019 DailyBits · WordPress · Log in