Author Archives: Hacker Medic

Travnet Botnet Controls Victims With Remote Admin Tool

The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the list of running processes, adds new file extensions to its list of files to steal, and has improved its control commands. Also, after the malware has uploaded the stolen files on its remote server, the Read more…

A Phone Call, a Phish, and a Remote Access Trojan

In April 2013, Symantec was alerted to a series of sophisticated social-engineering attacks targeting a limited set of organizations in Europe. The most distinguishing feature of these attacks is that the victim will receive a phone call from the attac…

Three Key Takeaways from the 2013 Verizon Data Breach Report

It’s that time again, where we look back at the year passed and assess how the threat landscape has changed—for better and for worse. The 2013 Verizon Data Breach Investigations Report (DBIR) reveals that last year was not only defined by the varied nature of cyberattacks, but also by the increased frequency of these incidents in general. Read more…

When Web Servers Serve Evil

      No Comments on When Web Servers Serve Evil

In the last few months, we have witnessed a rise in the number of cases of modified Web servers that inject malicious redirections into every website that it hosts. One example was the malicious Apache module (Linux.Chapro and Trojan.Apmod) that we blo…

Mystery/Secret Shopper Schemes

      No Comments on Mystery/Secret Shopper Schemes

The IC3 has been alerted to an increase in employment schemes pertaining to mystery/secret shopper positions. Many retail and service corporations hire evaluators to perform secret or random checks on themselves or their competitors, and fraudsters are capitalizing on this employment opportunity. Victims have reported to the IC3 they were… Read more »

What you need to know to migrate from 1024-bit to 2048-bit encryption

I hope by now that you are aware that the Certificate Authority/Browser Forum has mandated that Certificate Authorities stop supporting 1024-bit key length RSA certificates for both SSL and code signing by the end of this year (2013). To learn more abo…

Have mergers, acquisitions and changes in vendors’ strategies benefited cloud email and web security customers?

Part 1 – changes in the industry
The email and web security industry has seen many changes over the past years, especially in the cloud or SaaS market. Many vendors in this space started by offering email anti-malware and anti-spam services. They…

Fake Promotional Offers Targeting UEFA Champions League 2013

The 58th season of the UEFA Champions League is coming to an end with the final being played on May 25 at Wembley Stadium in London. Nowadays, cybercriminals are gaining a lot of interest in football, at least inasmuch as how to exploit interest in foo…