Malware Mischief

Warning: ‘Mitt Romney Almost President’ Is a Malware Attack, Not a CNN Alert

Detail of image from SophosLabs

SophosLabs reports that malware attacks tend to surge near major elections and the most recent is calculated to pull in anxious voters on either side of the political spectrum; a malicious email purporting to come from CNN declaring “CNN Breaking News–Mitt Romney Almost President.”

In a post on their NakedSecurity blog, Sophos explains why no one should click a link from an email like this: Read More

Malware Mischief

Chrome Users Fooled Into Installing Fake and Malicious Bad Piggies Browser Game

(Screengrab)

Google Chrome users who think they’re downloading a browser version of the Angry Birds-related Bad Piggies game could be in for a nasty surprise–just ask the 80,000 or more users who recently installed malicious Bad Piggies fakes directly from Google’s Chrome Web Store.

Geek.com refers readers to the Barracuda Labs Internet Security Blog, which details conclusions researchers made once they started pulling apart the real payload accompanying the scammy games: Read More

SCAMS

New Universal Exploit Lets Cyber Thieves Immediately Snatch Data From Browser Forms [Video]

Screengrab

Malware scammers are streamlining the process they use to steal vital information with a new exploit that works on any website, not just a mocked-up PayPal form. This newly-discovered exploit has been spookily dubbed “Universal Man-in-the-Browser,” or uMitB.

Past scams used plain old Man-in-the-Browser to lift stolen data. Man-in-the-Browser (MitB) extracts data from fake forms that look just like any online purchase page. Cons have to take log files of information gathered by a Man-in-the-Browser scam and sort it for vital information before selling it via black markets online. This need to parse the stolen data worked in the victim’s favor, as it gave anyone who realized they’d fallen for the ploy the time to cancel or close their accounts.

Universal Man-in-the-Browser eliminates the lag time between victim data entry and scammer data use and can pull from any web page. George Tubin, a senior security strategist at security vendor Trusteer, explained uMitB in more detal to CSO Online: Read More

Malware Mischief

Researchers Develop ‘Visual Malware’ for Android

unhappy android

Via Gizmodo we have learned of PlaceRaider, the scariest damn Android malware you never want hiding on your cuddly old pal, the full-featured smartphone.

Researchers at the US Naval Surface Warfare Center created PlaceRaider and have dubbed it “visual malware.” It was developed as a proof of concept but would also be a great idea to sell to producers seeking spy gadget ideas for the next James Bond film, because PlaceRaider hints at the future of covert surveillance: Read More

Hack Hack Hack Hack It Apart

Demo Shows How Easily Your iPhone 4S and Android Phone Can Be Hacked

Hope you don't get cancer, CEO guy. (flickr.com/perspective)

Attendees at the EuSecWest-sponsored World Security Professional Summit in Amsterdam are participating in a contest called Mobile Pwn2Own. Contestants are, yes, basically revealing that our mobile devices can be easily pwned by someone with the know-how. Quell your bubbling phone fanboy or fangirl rage right now: it looks like both Androids and iPhones are vulnerable. The Next Web describes the Android pwnage, which was partially done, by the way, via near-field communication, or NFC: Read More

Flame I'm Gonna Live Forever

Russia’s Kaspersky Lab Cracks Password Attached to Alleged U.S. Cyber Weapon

What Flame did to Iranian computers. (Image: William Warby, Flickr)

The Cold War is over and Russia and America are getting along. So surely the Men in Black behind the United States’ cyber weapons program based at Area 51 or wherever will not be too concerned that a Russian researcher cracked an encoded password associated with the now infamous, allegedly American-made Flame malware.

Symantec and Kaspersky recently teamed to pick apart Flame’s command and control systems, discovering at least three previously unknown infectious scripts in the process. The researchers also discovered a great deal about how the weapons were assembled and launched against enemy targets, but were left with a hashed passcode they couldn’t break. They put out a call for help but didn’t need the assistance of anyone outside either outfit, after all: Read More

Flame I'm Gonna Live Forever

Researchers Uncover U.S. Footprints in Mysterious Cyber Warfare Tools

Attack workflow for Flame controllers (Symantec)

Kaspersky Lab and Symantec have teamed up to peel apart the United States’ cyber warfare efforts. So far, they have uncovered the command and control systems behind the sophisticated malware as well as three previously unknown chunks of malicious code possibly related to alleged American cyber superbugs Flame and Duqu.

Reuters reports that researchers from the security firms discovered how the malware was disseminated–through an outwardly innocent-seeming content management system (CMS) named Newsforyou: Read More