End-of-Shift report
Timeframe: Freitag 07-12-2012 18:00 − Montag 10-12-2012 18:00
Handler: Matthias Fraidl
Co-Handler: Christian Wojner
Sophos Security Threat Report 2013, today... tomorrow
"Sophos was one of the first security firms that has published a report, Sophos Security Threat Report 2013, on current status of security landscape making predictions for incoming year. The document propose an interesting overview on most common and dangerous cyber threats attempting to determine the level of penetration by different countries. The factors that have primary contributed to the diffusion of new cyber threats are the increasing in use of social networks platforms and
http://www.infosecisland.com/blogview/22771-Sophos-Security-Threat-Report-2013-today-tomorrow.html
Onlinebanking lieber per Althandy
Derzeit droht Nutzern von Internet-Banking-Diensten Gefahr durch den Trojaner Eurograbber, der Geld von mehr als 30 000 Bankkonten erbeutet haben soll. Er greift Online-Banking-Teilnehmer, die PC und Smartphone kombiniert einsetzen, gezielt an und fängt durch geschickte Fragen sowohl Kontodaten als auch Transaktionsnummern seiner Opfer ab. Internetnutzer können sich jedoch mit ein paar Tricks schützen.
http://www.heise.de/security/meldung/Onlinebanking-lieber-per-Althandy-1764670.html/from/atom10
My Little Pronny: Autorun worms continue to turn
"Malware activity exploiting Autorun on Windows computers has been generating quite a few calls to ESET support lines lately, reminding us that old infection techniques seldom die and USB flash drives can still be an effective means of getting malicious code onto a computer. USB drives can be used to infect computers that automatically execute files on removable media when that media is inserted. On Windows machines this is known as the Autorun feature (referred to as Autoplay in Windows
http://blog.eset.com/2012/12/07/autorun-worm-continues-to-turn
16-30 November 2012 Cyber Attacks Timeline
"November has gone and its time to review this months cyber landscape. From a Cyber Crime perspective, November 2012 will be probably remembered for the breach to Nationwide, one of the largest insurance and financial services providers in the US, a breach that has potentially left up to 1 million users exposed. Unfortunately, in terms of massive breaches, this is not the only remarkable event of the month, just at the end Acer India has suffered a massive cyber attack culminated in the
http://hackmageddon.com/category/security/cyber-attacks-timeline/
That square QR barcode on the poster? Check its not a sticker
Crooks slap on duff codes leading to evil sites Cybercrooks are putting up stickers featuring URLs embedded in Quick Response codes (QR codes) as a trick designed to drive traffic to dodgy sites.
http://go.theregister.com/feed/www.theregister.co.uk/2012/12/10/qr_code_sticker_scam/
Trojans spread from compromised Dalai Lama website
December 5, 2012 Russian anti-virus company Doctor Web is informing users that several Trojans are being spread from compromised websites. In particular, malware is being downloaded from the official site of the Dalai Lama. Mac OS X systems are in danger as well as Windows PCs. Several days ago Doctor Web was informed that the official site of Tibet's spiritual leader, the Dalai Lama, had been compromised. Doctor Webs analysts discovered that when loading a page from the site in a
http://news.drweb.com/show/?i=3124&lng=en&c=9
DDoS Attacks: Lessons Learned - 4 Thought Leaders Share Insights About Bank Attacks
"Distributed-denial-of-service attacks waged against leading U.S. banks between mid-September and mid-October led to improved information sharing about threats. And that exchange proved effective in minimizing disruptions. Inter-bank and industry communication helped financial institutions targeted later in the DDoS campaign suffer less severe outages than those targeted earlier, says Mike Smith, a DDoS specialist at Web security vendor Akamai Technologies...."
http://www.bankinfosecurity.com/ddos-attacks-lessons-learned-a-5343?rf=2012-12-10-eb&elq=359e4b55aab649a7a9562c8e8eb5e77b&elqCampaignId=5290
The "hidden" backdoor - VirTool:WinNT/Exforel.A
Recently we discovered an advanced backdoor sample -
VirTool:WinNT/Exforel.A. Unlike traditional backdoor samples, this
backdoor is implemented at the NDIS (Network Driver Interface
Specification) level.
https://blogs.technet.com/b/mmpc/archive/2012/12/09/the-quot-hidden-quot-backdoor-virtool-winnt-exforel-a.aspx
Vuln: TP-LINK TL-WR841N Router Multiple HTML Injection Vulnerabilities
TP-LINK TL-WR841N Router Multiple HTML Injection Vulnerabilities
http://www.securityfocus.com/bid/56602
VLC Media Player 2.0.4 Buffer Overflow
Topic: VLC Media Player 2.0.4 Buffer Overflow Risk: High Text:Title : VLC media player 2.0.4 buffer overflow POC Version : 2.0.4 Twoflower Date : 2012-12-06 Vendor : http:/...
http://feedproxy.google.com/~r/securityalert_database/~3/JsOQvc6gSeY/WLB-2012120063