Infosec Weekly Round-up December 02-09, 2012

The Citadel crimeware kit – under the microscope

“Ever since the source code of the Zeus crimeware kit, also known as Zbot, was leaked onto the internet in May 2011, many new variants have appeared. These have typically added new features and improved on the old code. One particularly prevalent example is Citadel.”

http://nakedsecurity.sophos.com/2012/12/05/the-citadel-crimeware-kit-under-the-microscope/

Japan Aerospace Exploration Agency hit again by malware

“The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that stolen secret information on newest rockets from an internal computer.”

http://securityaffairs.co/wordpress/10760/hacking/japan-aerospace-exploration-agency-hit-again-by-malware.html

Trend Micro detects malware posing as Trend Micro component

“In a rather worrying finding, Trend Micro has stated in a blog post that it has stumbled upon a Trojan that disguises itself as a Trend Micro component. One of the tricks employed by malware writers, the Trojan disguising itself as such is being treated as potent enough to lure users into downloading and executing it.”

http://tech2.in.com/news/general/trend-micro-detects-malware-posing-as-trend-micro-component/631132

Slide Show: Top 10 Malware Advances In 2012

“Blackhole’s business model, Flashback’s Mac fetish, ransomware’s resurgence with Reveton, and Gauss’s ability to guard against analysis among the game-changers this year”

http://www.darkreading.com/galleries/security/attacks-breaches/240143985/slide-show-top-10-malware-advances-in-2012.html

Hack in the Box Magazine Keeping Knowledge Free

Bot Wars – The Game of Win 32/64 , System Takeover, Memory Copy Functions in Local Windows Kernel Exploitation, Android Persistent Threats, Does the Analysis of Electrical Current Consumption of Embedded Systems could Lead to Code Reversing? , To Hack an ASP.Net Site? It is Difficult, but Possible! , A Brief Introduction to VEGA

http://magazine.hackinthebox.org/issues/HITB-Ezine-Issue-009.pdf

That’s all for this week, if you have more information security news please to share them with our readers by sending emails or using the contact form.

Share