For about two weeks now, the ZeuS source code has been making its way around to different people. Many people have offered it up for sale on multiple forums, but lots of times it is only pieces of the code and not everything. There are also conflicting reports about important pieces of the code [...]
With firewalls, antivirus and other security mechanisms protecting corporate networks, how do attackers manage to penetrate enterprise computer systems? Simply by exploiting the weakest link in the security chain. One of the newest methods is tunnelling in via employees’ browsers using an attack known as “Man-in-the-Browser” (MitB).
Read entire article
We’re currently monitoring a still-ongoing mass compromise involving a great number of websites. The compromised sites have been injected with a malicious script that triggers redirects to certain URLs which lead to malware such as FAKEAV. Based on Google searches, there is no common denominator in terms of the industry to which the compromised [...]
In February 2011, we successfully collaborated with a registrar to gain control of a ZeuS botnet command-and-control (C&C) server, thereby rendering it ineffective. Our success gave us the opportunity to capture valuable research information about the bot (compromised computer) types under its control. ZeuS is a notorious crimeware toolkit that is prolifically used by cybercriminals [...]
Malware attacks that exploit vulnerabilities in popular software in order to compromise specific target sets are becoming increasingly commonplace. Prior to the highly publicized “Aurora” attack on Google and at least twenty other companies, targeted malware attacks had been taking place and they continue to affect government, military, corporate, educational and civil society networks. While such [...]