Home Tags Uniform Resource Locator (URL)

Tag: Uniform Resource Locator (URL)

Ztorg: money for infecting your smartphone

This research started when we discovered an infected Pokeacute;mon GO guide in Google Play. We detected the malware as Trojan.AndroidOS.Ztorg.ad.

After some searching, I found some other similar infected apps that were being distributed from the Google Play Store.

After I started tracking these infected apps, two things struck me – how rapidly they became popular and the comments in the user review sections.

John Oliver tackles net neutrality again, crashes FCC comments site—again

Oliver helps lead protest against dismantling of Title II net neutrality rules.

YouTube channel tries swapping hosts, gets caught by 1 million subscribers

“You guys are watching me like I’m Ramsay Bolton in Winterfell.”

Use of DNS Tunneling for C&C Communications

Often, virus writers don't even bother to run encryption or mask their communications. However, you do get the occasional off-the-wall approaches that don't fall into either of the categories.

Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.

Personalized Spam and Phishing

Lately we have been noticing an opposite tendency occurring quite often, wherein fraud becomes personalized and spammers invent new methods to persuade the recipient that the message is addressed personally to him.

Thus, in the malicious mailing that we discovered last month, spammers used the actual postal addresses of the recipients in messages to make them seem as credible as possible.

Facebook highlights its fight against “Fake News” in print

The 10 tips are basic news literacy, but Facebook wants the world to know.

VU#921560: Microsoft OLE URL Moniker improperly handles remotely-linked HTA data

Microsoft OLE uses the URL Moniker to open application data based on the server-provided MIME type,which can allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system.

5 reasons Node.js rules for complex integrations

Richard Whitehead is evangelist in chief at Moogsoft, the creators of Moogsoft AIOps, a next-generation, algorithmic solution for devops and IT operations management.Because software solutions rarely operate in a vacuum, integration is a necessary fact of life for many developers.
Sometimes it’s easy.

Anyone who has integrated an application into Slack, for example, will have been treated to an incredibly smooth experience.
In many cases it’s as simple as filling in a form (a URL or two, an authentication key) and hitting the Submit button.

That’s plain awesome.To read this article in full or to leave a comment, please click here

Ubiquiti network gear can be ‘hijacked by an evil URL’ –...

And, nope, no patch Security researchers have gone public with details of an exploitable flaw in Ubiquiti's wireless networking gear – after the manufacturer allegedly failed to release firmware patches.…

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor.

The attack compromised their devices and exfiltrated data to the attackers’ C&C.
In addition, the compromised devices were pushed Trojan updates.

The operation remains active at the time of writing this post.

Cisco Secure Access Control System Open Redirect Vulnerability

A vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page.   The vulnerability is due to improper input vali...

Cisco ASA Clientless SSL VPN CIFS Heap Overflow Vulnerability

A vulnerability in Common Internet Filesystem (CIFS) code in the Clientless SSL VPN functionality of Cisco ASA Software could allow an authenticated, remote attacker to cause a heap overflow. The vulnerability is due to insufficie...