2 Million Passwords Compromised After Botnet Infection Spree

2 Million Passwords Compromised After Botnet Infection SpreeJust how good is the security of your computer? Do you have really, really strong passwords, so much so that it is virtually impossible to crack them even with brute force computing? Well, you know what they say about security – a chain is only as strong as its weakest link. In one of the more recent security snafus to date, more than two million passwords have been posted online after a botnet managed to successfully infect thousands of machines, while relying on a keylogger to obtain those passwords. These passwords do not hail from a particular online service, but rather, will include Yahoo!, Facebook, Twitter, LinkedIn and others.

We do know that out of the 2 million passwords which have been leaked online, around 300,000 of those happen to be passwords of Facebook accounts. Security firm TrustWave have reason to believe that the botnet, known as Pony, had managed to infect thousands of computers, and could even be in action still as you read this. After analyzing the data, Trustwave picked up something interesting – more than 15,000 instances of a password being ‘123456’ made up part of the compromised passwords, now how about that? Malware is always tough to look out for, don’t you think so?

  • Follow: Computers, , ,
  • 2 Million Passwords Compromised After Botnet Infection Spree original content from Ubergizmo.

        



    Prototype Malware Spreads Via Audio Signals

    Prototype Malware Spreads Via Audio SignalsThe digital world has its fair share of benefits, but do be aware that there are also dangers and pitfalls to look out for as well. Computer viruses as well as malware have evolved over the years, that even the mobile platform is not spared. Well, researchers have come up with another way that would certainly prove to be a headache for network administrators everywhere – through the creation of a proof-of-concept software which will be able to spread from one machine to another using audio signals via integrated speakers and microphones. This would certainly put a dent to the notion that computers that remain isolated from a network cannot be infected by malware.

    I guess with this research, it would mean the reliability of the “air gap” is no longer a surefire security measure used to ensure that sensitive information remains well protected. Inaudible audio signals were transmitted in small amounts of data over covert channels, with distances touching 65 feet even. So much for a missing Internet connection being enough of a deterrent against malware. The researchers behind this proof-of-concept did warn that attackers could arm the malware with keyloggers so that sensitive information can be recorded. They shared, “The concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustical communications are usually not considered.” Now what, an isolated computer to be placed in a sound-proof room?

  • Follow: Computers, ,
  • Prototype Malware Spreads Via Audio Signals original content from Ubergizmo.

        



    New Malware Can Jump Air Gaps Using Inaudible Sound

    New Malware Can Jump Air Gaps Using Inaudible Sound

    A team of computer scientists has developed a new breed of malware, which can leap between devices using inaudible audio signals—then covertly transmit passwords and other sensitive data without a network connection.

    Read more…


        



    Bitcoin mined from computers via toolbar without users’ knowledge

    Bitcoin miners are good folk, by and large. That’s why it’s always disheartening when we hear about a case of Bitcoin thieving and scheming. An investigation by Malwarebytes last week found that a company named Mutual Public a.k.a. We Build Toolbars a.k.a. Your Free Proxy has been installing Bitcoin mining software on unwitting users’ computers […]

    Linux-based Internet-connected devices widely vulnerable to new worm

    Symantec researcher Kaoru Hayashi has posted a report to the effect that a sizable portion of the “Internet of Things” is now vulnerable to a worm called Linux.Darlloz. The worm attacks CPUs running on devices like routers, set-top boxes, security cameras and industrial control systems, as well as PCs. The worm relies on a pre-May […]

    NSA hackers compromised at least 50,000 networks in 14 years

    A large team of NSA hackers known collectively as the Tailored Access Operations (TAO) department successfully hacked 50,000 computer networks between the years 1998 and 2012, according to a new examination of the Snowden documents. A PowerPoint presentation seen this week by Dutch newspaper NRC Handelsblad revealed the statistic along with other information about the […]

    Happy Hour Virus: Book of E-lies

    Ad agency TDA_Boulder came up with Happy Hour Virus, a website that fakes computer problems. The idea is that you’ll be able to use the “problem” as an excuse to leave work. I don’t think it actually has a chance of getting you off of work, but you can use it to punk your non-techie colleagues for a few seconds.

    happy hour virus 620x446magnify

    As you can see in the screenshot above, Happy Hour Virus has three tricks. There’s the ol’ Windows nemesis, the Blue Screen of Death, complete with pseudo code cascading down the screen:

    happy hour virus 2 620x439magnify

    Then there’s the rare but dreaded kernel panic prompt from OS X:

    happy hour virus 4 620x449magnify

    Finally there’s the system agnostic broken screen glitch:

    happy hour virus 3 620x426magnify

    The hilarious thing about this fake malware is that it will disappear when you press the Escape button. Even the most clueless office worker is bound to stumble upon that “solution” and help you be productive again. But as I said, it can work as a harmless prank. Try out Happy Hour Virus here.

    [via OhGizmo!]

    Get Out of Work Early With This Handy Happy Hour Virus

    Get Out of Work Early With This Handy Happy Hour Virus

    Everybody hates malware. It’s scary—all your personal information could be exposed! It’s annoying—all your data could disappear! It’s confusing—none of your friends really know how it works! This is why fake malware is the best new way to play hooky.

    Read more…


        



    International Space Station experienced “virus epidemics” due to infected USB drive

    The international space station’s computer systems were infected by an unspecified virus this year, according to Kaspersky. The malware made its way into space on a removable device carried by Russian astronauts, and though the extent of the damage hasn’t been specified, it has been revealed that on occasion, the station has suffered “virus epidemics”. […]

    Did a USB Stick Infect a Russian Nuclear Plant with Stuxnet?

    Did a USB Stick Infect a Russian Nuclear Plant with Stuxnet?

    There’s a common misconception that you need to be connected to the internet to get infected with malware. Well, that’s not true and, according to renowned cybersecurity expert Eugene Kaspersky, the folks at a nuclear power plant in Russia learned this the hard way.

    Read more…