Blog Archives

Bitdefender: prima versiune a MiniDuke, activa de aproape un an

O versiune initiala a sofisticatului software periculos MiniDuke, care a afectat institutii guvernamentale si agentii din Europa, este activa inca din mai 2012, releva analizele Bitdefender, potrivit unui comunicat de presa al companiei de securitate

MiniDuke a fost detectat de Bitdefender Labs cu aproape un an in urma, iar respectiva versiune de malware a fost adaugata in baza de virusi pe 26 mai, 2012, desi soft-ul periculos nu era cunoscut la acel moment pentru efectele sale.

Varianta initiala a MiniDuke difera de cea descoperita saptamana trecuta, in primul rand prin faptul ca utilizeaza un mod diferit de instalare. In plus, aceasta acceseaza pagina de internet time-server.org, pentru a vedea care e data curenta in China. Comportamentul acestei prime versiuni de malware este, in rest, similar celui anuntat recent.

vir

“Software-ul periculos MiniDuke poate provoaca daune majore sau poate colecta cantitati uriase de informatii pe parcursul a 10 luni. Descoperirea unei versiuni initiale a acestui virus, in mai 2012, sugereaza ca suntem inca la inceput in a intelege dimensiunea si scopul MiniDuke. Analizam in continuare software-ul si vom face publice si alte detalii importante atunci cand vor fi descoperite”, a declarat Catalin Cosoi, Chief Security Strategist, Bitdefender.

Analizele efectuate pana acum releva ca MiniDuke extrage informatii din sistemele informatice ale guvernelor Irlandei, Belgiei, Romaniei, Portugaliei si Cehiei precum si din alte institutii, precum un furnizor de servicii medicale din Statele Unite ale Americii sau organizatii din Japonia, Brazilia etc.

Bitdefender a anuntat disponibilitatea unui utilitar de dezinfectie gratuit pentru acest virus.

Sursa:hit.ro

 

Cum sa instaleaza Bitdefender(How to install Bitdefender)

logo-bitdefender

In this video tutorial about how to install them Bitdefender

VIDEO HD FULL

 

Site-ul YouTube, blocat de Google Chrome pe motiv de malware

google_chrome_18Pe lista mai sunt si alte site-uri importante, printre care si DeviantArt

Google Chrome se intampla sa blocheze, pe motiv de malware, mai multe site-uri importante, precum imgur, DeviantArt, San Francisco Chronicle sau YouTube, scrie  Gizmodo.Pe Twitter au aparut o multime de persoane care au reclamat acest lucru.

Deocamdata, cauza acestor alerte este necunoscuta si, cel mai probabil, inginerii companiei lucreaza la remedierea ei. Nu se cunoaste, la aceasta ora, nici macar daca e vreun sambure de adevar in toata aceasta poveste, iar ceva malware ar exista pana la urma.

Sursa:Foto yoda.ro

Sursa:Foto yoda.ro

Sursa:yoda.ro

 

 

 

Un virus de Android iti ataca PC-ul, iti activeaza microfonul si inregistreaza tot ce spui

Sursa:foto yoda.ro

Sursa:foto yoda.ro

Virusul a fost descoperit de cei de la Kaspersky. Iata ce nebunii face:

Specialistii rusi in securitate de la Kaspersky au descoperit un malware de Android care nu doar ca iti infecteaza telefonul, dar isi face de cap si prin calculatorul tau. Acelasi virus preia controlul PC-ului si iti asculta toate conversatiile.

Aplicatia-problema se gaseste in Google Play si nu cumva sa o descarci. Culmea, poarta numele DroidCleaner. Dupa ce iti infecteaza telefonul, poate sa trimita SMS-uri, sa deschida Wi-Fi-ul, sa adune informatii despre smartphone, sa deschida link-uri in browser, sa faca upload la tot continutul cardului tau SD, sa urce pe serverul ei un fisier sau un folder, sa urce toate SMS-urile, sa-ti stearga SMS-urile, sa-ti urce pe server agenda, fotografiile si coordonatele geografice.

Si daca s-ar opri aici, tot ar fi dezastru. Insa atunci cand functioneaza, aplicatia descarca 3 fisiere in root-ul cardului tau SD, iar cand telefonul se conecteaza la un calculator prin USB, iti infecteaza si calculatorul. Apoi, malware-ul iti activeaza microfonul si urca inregistrarile pe serverul-mama, scrie Gizmodo.

Sursa:foto yoda.ro

Sursa:foto yoda.ro

Sursa:yoda.ro

 

ANDROID 2012

 

 

 

 

Android devices are the most prevalent smartphones on the market, and the most maligned. Hackers had a banner year in 2012 targeting the  mobile platform with a variety of malware and attacks that netted them profit and unprecedented access to mobile devices.

image-copy

 

Not only were attackers using commodity SMS Trojans to rack up premium charges for a nice profit, but they expanded their reach with a slew of malicious applications, as well as sophisticated malware that garnered them root access to devices with alarming regularity.

Researchers at Kaspersky Lab said that 99 percent of mobile malware detected every month was written for the Android platform, peaking in the month of May with close to 7,000 unique attacks detected. The most prevalent by far with the Opfake Trojan  which often infected users who were thinking they were downloading a legitimate application. The malware steals money from victims by sending SMS messages to premium numbers and also collects data about the device for potential later abuse. Most of these types of attacks target users in Russia, Kaspersky said, because it is a popular program among Russian malware writers and provides them with a dependable source of income.Opfake and Fakeinst, which is also a premium SMS dialer, accounted for almost 50 percent of all Android malware in 2012, Kaspersky said. The next most prevalent was Plangton, which is also spread via malicious applications to display advertisements and provide an attacker with remote access to the device. This kind of root access Trojan, Kaspersky said, was the third most prevalent type of Android malware to surface in 2012.  The core security issue, however, could be traced to the lax security of the Google Play marketplace, especially in comparison to the Apple iOS App Store. Applications can be submitted to the store and once they pass an initial security check, can be modified without additional checks. This enables hackers to modify code on the fly. Google’s Bouncer antimalware scanner,  too, has failed to make a significant dent in the number of malicious apps in circulation.

In 2012, we also saw the first mobile botnets. The Foncy IRC bot worked hand-in-hand with a similarly named SMS Trojan. The malware dropped a root exploit for privilege escalation giving the IRC bot remote control over a smartphone, Kaspersky said, via shell commands. Kaspersky said the malware’s Chinese authors built a botnet reaching up to 30,000 devices that ran profitable SMS schemes.

Also in 2012, mobile malware was used in targeted attacks, in particular the Zitmo Trojan. Zitmo, or Zeus in the mobile, is an offshoot of the Zeus banking malware and was used against Android and BlackBerry devices in hacks that would commit fraud against consumer and corporate banking accounts, moving funds to a mule account without the victim’s knowledge.

Espionage was also carried out over mobile devices in 2012, for the first time with any prevalence. Attackers used a variety of backdoors and spyware against corporate users logged location data, tracked the device’s position, made surreptitious calls and sent data to remote servers.

Surely more of the same is in store for 2013 as Android’s market share increases and malware writers find more success infecting phones and turning a quick profit.

Sursa: blog.kaspersky.com

 

 

EARTH CHANGE MZ

Viziunea mea asupra omului nou este cea a rebelului in cautarea SINELUI, a fetei lui adevarate. Un om pregatit sa arunce toate mastile, toate caracterele prefabricate, toata ipocrizia, gata sa arate lumii cine este el cu adevarat. Si daca va fi iubit sau condamnat, respectat sau huiduit, incoronat sau crucificat, pentru el va fi acelasi lucru, fiindca A FI TU INSUTI este cea mare binecuvantare a EXISTENTEI. Un om adevarat, sincer, care cunoaste IUBIREA si COMPASIUNEA intelege ca oamenii sunt orbi, inconstienti cu spiritul adormit ~ OSHO (CARTEA DESPRE BARBATI)

Christ! Xmas

all about Christmas and Santa.

%d bloggers like this: