Trojan targets Linux desktop users, steals web banking info

Trojan targets Linux desktop users, steals web banking info

Malware certainly exists for Linux, but it’s more frequently targeted at servers than everyday PCs. Unfortunately, regular users now have more reason to worry: a rare instance of a Linux desktop trojan, Hand of Thief, has surfaced in the wild. The code swipes banking logins and other web sign-in details, creates a backdoor and prevents access to both antivirus tools and virtual machines. It’s known to work with common browsers like Chrome and Firefox as well as 15 Linux distributions, including Debian, Fedora and Ubuntu. Thankfully, Hand of Thief is partly neutered by its limited attack methods; it relies on social engineering to fool victims into installing the software themselves. Even so, the trojan is a reminder that we shouldn’t be complacent about security, regardless of which platform we use.

[Thanks, Dreyer]

Filed under: ,

Comments

Via: ZDNet

Source: RSA

Apple Store gift card scam bypasses phishing for all-out malware exploits

We see a lot of scams and phishing attempts all the time, but a new one that was discovered by security research firm Webroot reveals a malware-infested email campaign that tricks users into thinking that they have received a $200 Apple Store gift card, when in reality, it’s an attempt to install malware on Windows […]

How to Safely Continue Using TOR on Windows

How to Safely Continue Using TOR on Windows

An attack against Tor Browser users on Windows machines was discovered this Sunday, and there is speculation that the uncovered malware was used by a law enforcement agency to harvest the IP addresses of users of several hidden services hosted by Freedom Hosting. The malware exploits a serious JavaScript security vulnerability affecting Firefox and other products that share the same code base, including the Tor Browser.

Read more…

    

Tor browser for Windows exploit discovered, malware may be gathering info for Uncle Sam (updated)

It was just over two years ago that the paragon of internet privacy, the Tor project, decided to build its own browser by forking Firefox. Wired reports that an exploit of that very same browser has been recently discovered that allowed a number of users’ Windows computers to be infected with malware. Once installed, the code delivered infected machines’ hostnames and MAC addresses to a remote web server in Reston, Virginia, a city located just outside Washington D.C. The browser exploit — a JavaScript vulnerability inherent to Firefox version 17, the version upon which the Tor browser was built — was enabled by a breach of Freedom Hosting servers. In this case, affected Freedom Hosting servers delivered web pages to users with the JavaScript exploit embedded in them.

There’s no direct evidence that the malware comes from the government, but the malware’s command and control IP address is registered to a governmental defense contractor. Plus, the data pulled from infected machines indicates it could be an example of the FBI’s computer and internet protocol address verifier (CIPAV) software first identified by Wired in 2007. CIPAV has been used by the FBI to help identify and catch terrorists, hackers and criminals since 2002, but the exact nature of the software has never been revealed. Regardless, the vulnerability in the browser has been identified and fixed, so users need only update to the newest version of the Tor browser to keep their web traffic away from prying eyes… for now, at least.

Update: To be clear, the Firefox exploit in question was fixed, along with the Tor browser well over a month ago, and any users who have updated since June 26th were not affected.

Filed under:

Comments

Via: Wired

Source: Tor Project, Tor Blog

Android’s One-Click Google Auth Is a Buffet for Hackers

Android's One-Click Google Auth Is a Buffet for Hackers

If you’ve got an Android device, you’ve probably used Google’s handy one-click authentication shortcut, that handy little button that lets you sign into various Google service sites without having to enter your password. It’s super convenient! For you and for hackers.

Read more…

    

The Most Suspicious File of All

The Most Suspicious File of All

We’ve all done it. We’ve all clicked on a link that we probably shouldn’t have, confused a gremlin for a Mogwai. But if you ever click the mother of all suspicious links, you deserve whatever’s coming to you.

Read more…

    

Apple says iOS 7 will patch exploit that lets rogue chargers install malware

iOS 7 press shot

Recently, Georgia Tech researchers discovered an unusual way to attack iOS: a third-party charger with a hidden computer can install malware when an iOS device is plugged in and unlocked. That won’t be an issue for much longer, however, as Apple has confirmed that iOS 7 beta 4 and future releases contain a fix. While the company hasn’t said what that solution is, Georgia Tech’s Billy Lau says that the new OS can tell when it’s plugged into a computer instead of a charger — there shouldn’t be any rude surprises. The dependence on an iOS 7-based fix could leave many users vulnerable until the fall, although the hardware-specific nature of the exploit means it’s unlikely to be a major concern.

Filed under: , , ,

Comments

Source: Reuters

This Guy Turned Himself in for Child Porn Because Malware Told Him To

This Guy Turned Himself in for Child Porn Because Malware Told Him To

We’re already well aware of the damage malware can do to your machine, but apparently, guilty consciences don’t fare all that well, either. At least not for one 21-year-old man who, after getting a fake pop-up demanding a fine for the child pornography on his computer, decided to take his laptop straight to the police—and was then promptly arrested on three counts of possession of child pornography.

Read more…

    

First real world ‘master key’ exploit discovered sneaking malware into Android apps

Image

Two apps have been discovered on unofficial marketplaces in China that might just be the first in-the-wild exploits of the massive bug found by Bluebox two weeks ago. The so-called “master key” vulnerability, or a least an extremely close relative of it, was the point of entry for malware in these two apps, which now carry code that allows an attacker to remotely hijack a device, harvest sensitive data and even disable a number of mobile security suites. The concern here, is that this particular security hole allowed these alterations to be made without invalidating the apps’ digital signatures. So, the malware was able to sneak through filters, hidden as a Trojan Horse inside pieces of legitimate software. Google has already patched the vulnerability, preventing compromised apps from slipping in to the official Play store. Additional updates addressing the flaw have been issued to carriers and manufacturers, but we all know it could be quite sometime before everyone applies the patches to their products.

Filed under: , ,

Comments

Via: Ars Technica

Source: Symantec

FBI-themed ransomware now affecting OS X users

Everyone has had to deal with malware of some sort at one point or another, with some being unlucky enough to come across the FBI-themed “ransomware” variety that presents itself as being a government threat of criminal charges should one refuse to pay a fine. This kind of malware has typically been the domain of Windows users, but has made its way to OS X.

ransomware1

The information comes from Malwarebytes, an anti-malware company. According to the rundown they’ve provided, the FBI ransomware is presenting users with a page that, at a quick glance, looks official enough: the beginning of the URL starts with fbi.gov.id, and and it harbors the real FBI logo, as well as a fake logo stating “The FBI” cyber department has targeted the user.

The trojan targets the users by using the “restore from crash” feature in the browser, which prevents the user from getting rid of the page. Attempting to close the tab results in a popup stating “YOUR BROWSER HAS BEEN LOCKED. All PC data will be detained and criminal procedures will be initiated against you if the fine will not be paid.” The “fine” in question? $300.

Aside from the threats of criminal procedures and other such nonsense, the ransomware tries to scare the user into paying the amount by specifying specific criminal activities it accuses the user of committing, such as violating copyright laws regarding music, video, and software, as well as viewing “prohibited pornographic content.”

Causing Safari to force quit won’t do any good for the user, with the ransomware page reappearing the next time the browser is fired up. Fortunately, the issue is pretty easy to get rid of by simply resetting Safari, which can be done by clicking “Safari” from the menu. All the items must be checked under the reset options.

SOURCE: Malwarebytes


FBI-themed ransomware now affecting OS X users is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.