Infosec Weekly Round-up October 08-14, 2012
Skype worm spreads, using LOL trick to infect unwary users
Skype users are warned to be on their guard, regarding malicious instant messages that have been sent through the service, designed to infect Windows computers.
New TDL4 strain very successful in hiding from AV
Last month Damballa stirred up the security community with the discovery of a new iteration of the notorious TDL4 rootkit. This rootkit is known for infecting the Master Boot Record (MBR) to gain control over everything that runs on the computer, making itself invisible for antivirus products and pretty hard to remove.
BoteAR: a “social botnet”? What are we talking about?
BoteAR (developed in Argentina) adopts the concept of “social networks” although it seems, as yet, not fully materialized. It offers a conventional and manageable botnet via HTTP but uses the model of crimeware-as-a-service.
SERT Quarterly Research Report
Q3 2012 highlights that 92% of malware analyzed during Q3 was mass distributed malware. Nearly 60% of all malware goes undetected by common AV software. The most common method of delivery used with banking Trojans is through the use of phishing email. Typically, the email will lure victims to a compromised website that redirects the victim’s browser to a landing page of an exploit kit. SERT has observed that the malicious emails often use an embedded hyperlink or an attached HTML file attachment.
State of Mobile Security 2012
The number of smartphone and tablet owners in the world will skyrocket to one billion in the next few years, according to Forrester. As the mobile economy gains momentum, it continues to capture the attention of malware writers.