Infosec Weekly Roundup April 30 – May 6, 2012

Cross-platform malware exploits Java to attack PCs and Macs

“The same Java vulnerability used in the infamous Flashback malware is now being used as an attack vector for a single piece of malware that can infect both Windows and Mac OS X computers.”

http://www.zdnet.com/blog/security/cross-platform-malware-exploits-java-to-attack-pcs-and-macs/11739

Hacked Websites Serve Suspicious Android Apps

“New Android Trojan that appears to serve as a simple TCP relay / proxy while posing as a system update. This threat does not currently appear to cause any direct harm to a target device, but could potentially be used to gain illicit access to private networks by turning an infected Android device into a proxy.”

http://blog.mylookout.com/blog/2012/05/02/security-alert-hacked-websites-serve-suspicious-android-apps-noncompatible/

A Wild Exploit Kit Appears… Meet RedKit

“During our research we have recently encountered a new private exploit kit. The developers behind this private kit decided to promote it with a standard banner. After clicking on this banner, you get to a page with a form asking for your jabber username…”

http://blog.spiderlabs.com/2012/05/a-wild-exploit-kit-appears.html

Targeting ZeroAccess Rootkit’s Achilles’ Heel

“ZeroAccess is one of the most talked and blogged, about rootkits in recent times. It is also one of the most complex and highly prevalent rootkits we have encountered, and it is continuing to evolve. The ZeroAccess rootkit is distributed via both social engineering as well as by exploitation…”

http://blogs.mcafee.com/mcafee-labs/targeting-zeroaccess-rootkits-achilles-heel

Hacktivism – The Hacker News Magazine

“Our fearless leader, Mohit Kumar, founder of The Hacker News opens the discussion with a look at the meaning of Hackitivism and what it means for society today…”

http://news.thehackernews.com/THN-May2012.pdf

That’s all for this week, if you have more information security news please to share them with our readers by sending emails or using the contact form.

Share