Quantcast

Archive: 2013

CryptoLocker Virus: “Your Personal Files Are Encrypted!”. How-To-Remove Guide

September 2013 turned out fruitful and lucrative for one of the cybercrime syndicates out there, but really alarming for private users and organizations on the other side of the IT security battlefield. The reason is the launch of a vicious computer infection known as CryptoLocker which in terms of severity...

Bruce Schneier on The Matthew Filipowicz Show 2: Obstacles to Restoring Trust for the NSA

As a follow-up on the interview, Bruce Schneier explains his perspective of ways for the NSA to regain citizens’ trust and the economic aspects of the matter. – I’m talking to Bruce Schneier, a security technologist, encryption specialist and author. Let’s talk about the political side of what...

Guide to remove New Zealand Police virus

The New Zealand Police virus, also known as “Nga Pirihimana o Aotearoa” or New Zealand E-crime Lab ransomware, is targeting users physically located in New Zealand and does it in a fairly vicious way. This malicious code causes the affected operating system to display a scary-looking lock screen...

Bruce Schneier on The Matthew Filipowicz Show: NSA Working with Tech Companies to Insert Weaknesses into Code

This entry reflects a down-to-earth discussion with security guru Bruce Schneier about how the NSA endangers regular PC users while spying on alleged adversaries. – Alright, joining me now here on the Matthew Filipowicz show is Bruce Schneier. Bruce is a security technologist and encryption...

The US Department of Justice MoneyPak Virus Removal Tutorial

The reputable name of the United States Department of Justice has been disgracefully exploited in cybercrime schemes since late May 2013. Scammers ventured to launch a campaign involving ransomware distribution, stating that it’s being done on behalf of the above-mentioned federal executive department....

Bruce Schneier on the NSA’s Surveillance 5: Possible Backlash of Ubiquitous Spying

The Occupy Radio host and Bruce Schneier now dwell on the probable outcomes of the NSA’s spying activities and try to depict the future state of affairs. – Ok, now that exists on a domestic scale and it exists on an international scale: we want to have power over a government. I’m curious: is our...

Bruce Schneier on the NSA’s Surveillance 4: The Social Value of Privacy

The radio talk show host and security expert Bruce Schneier now discuss the amount and methods of data collection by the NSA and how it affects citizen privacy. – I’m speaking with authoritative security expert Bruce Schneier about the data collecting agency, the NSA. We’re talking about fear, real...

Royal Canadian Mounted Police Ransomware Virus Analysis and Removal

A big trend of today’s cybercrime is distributing ransomware locking victims’ computers allegedly on behalf of local law enforcement agencies. One of such infections pretends to come from the Royal Canadian Mounted Police, a reputable Canadian national police service. While the name of this institution...

Bruce Schneier on the NSA’s Surveillance 3: Misperceptions of Terrorism

The collocutors are now shifting the focus over to issues of defining terrorism and the role of corporate profit and political power in today’s NSA activities. – The fix is bringing all out into the open? – Yes. Like with any other program, we have to know if what they’re doing is legal, if...

Bruce Schneier on the NSA’s Surveillance 2: Eavesdropping on Everything

Bruce Schneier and the Occupy Radio host now discuss cost efficiency of the NSA’s programs and broad data mining as well as the political aspects of the matter. – We have been able to voice an opinion on the breadth of the spying that is happening against us? – The breadth, the depth, the...

Bruce Schneier: NSA is Wasteful and Dangerous

During a podcast on Occupy Radio, the host and a renowned security expert Bruce Schneier get to discuss the NSA practices in terms of treating citizen privacy and other related issues. – Bruce Schneier is an internationally recognized expert on cryptography and data security. He was dubbed a...

Australian Federal Police (AFP) Ukash Virus – Description and Removal Advice

Victim geolocation being today’s big trend in the cybercrime world, the ransomware version attacking Australian users came out in summer 2013. Similarly to its U.S.-based (the FBI Moneypak virus) and British counterparts (PCeU, Metropolitan British Police infections), the Australian Federal Police (AFP)...

CuteCats.exe and the Arab Spring 3: Surveillance Malware in Libya and Bahrain

Morgan Marquis-Boire finishes his Black Hat presentation with analysis of governmental cyber operations held during protests in a number of other Arab states. Syria isn’t the only country in this region that has experienced these types of operations though. After the success of the revolution in Tunisia,...

CuteCats.exe and the Arab Spring 2: Social Engineering and Remote Access Toolkits

Google’s Morgan Marquis-Boire is focusing on governmental use of topical social engineering, surveillance malware and remote access toolkits in Arab countries. While we’ve seen a steady stream of Facebook phishing attacks, we’ve also seen attacks focusing on Skype and YouTube. Many of you may have...

CuteCats.exe and the Arab Spring: Governments vs Dissidents

Morgan Marquis-Boire, Security Engineer at Google Incident Response Team, analyzes the digital aspect of activism and anti-dissident activities during the Arab Spring. Hello and welcome to CuteCats.exe and the Arab Spring. My name is Morgan Marquis-Boire and I work on the Google Incident Response Team....

Guide to Remove Metropolitan British Police Ransomware Virus

The Metropolitan British Police virus is one of the series of sophisticated geographically localized ransomware threats (FBI MoneyPak, PCeU malware) affecting computers at a steadily increasing rate for months now. The large-scale campaign behind this infection involves a complex infrastructure of web...

The State of Web Exploit Toolkits 4: Phoenix and Newer Kits

The presentation ends with the analysis of the Phoenix exploit kit’s features, details on newer kits from all over the world, and a summary of the research. Phoenix Exploit Kit The next kit I’m going to talk about is Phoenix. It’s been around since 2007, it’s pretty old, it’s up to version 3. They...

Police Central e-Crime Unit (PCeU) Ukash/Paysafecard Virus: Ransomware Analysis and Removal

Following the influx of the FBI MoneyPak ransomware variants, yet another type of extortion technique came to be in June 2012, pretending to emanate from the Police Central e-Crime Unit, part of the British Metropolitan Police Service. Mainly targeting UK users through determining the victim’s IP location,...

The State of Web Exploit Toolkits 3: How BlackHole Works

Jason Jones covers herein some of the specific features inherent to BlackHole kit, including JavaScript and PDF obfuscation details, JavaScript shellcode, etc. Now I’ll actually get a little bit more into how it works. Running all these things through our sandbox, we’ve looked a lot at URLs that it...

The State of Web Exploit Toolkits 2: BlackHole Kit Scrutinized

Jason Jones now provides an intro to the notorious BlackHole exploit kit, explaining some of its background as well as showing the interface that criminals use. The first kit I’m really going to delve into is BlackHole. It’s been around for a couple of years. It’s definitely become the most popular...

The State of Web Exploit Toolkits – Turnkey Cybercrime Software

During his Black Hat briefing, Jason Jones, the Team Lead for ASI at HP DVLabs, presents a professional extensive analysis of the present-day web exploit kits. I’m going to be talking about the state of web exploit toolkits, which is a lot of what I’ve been doing on my job. I’m the Lead for Advanced...

“Your PC is blocked”: Background of the Police Ransomware Virus

Reveton – the universal extortion instrument The Reveton Trojan which has become a buzzword in the IT security circles over the course of the past year or so is being actively exploited in different profit-driven cybercrime campaigns. A few weeks ago we posted a thorough analysis of the version generating...

From Russia with Love.exe 5: Questions and Answers

This is the final part of the study where The Grugq and Fyodor Yarochkin are explaining more details of the Russian hacking business during the Q&A section. Yarochkin: Alright, do you have any questions? Question: On your point about the ratios: so, this guy was offering the best ratio; do you know any...

From Russia with Love.exe 4: Geeks, Not Gangsters

You can learn here how much it costs to buy a massive DDoS attack service on Russian hacking forums, and what kind of people those sellers are. The Grugq: So, everyone probably knows Twitter went down some time ago. How much do you think that cost per day, on average? It’s 80 bucks! Come on, 80 bucks to...

From Russia with Love.exe 3: Money Laundering and Botnet Services

In this entry the security analysts are focusing on other popular commodities sold on Russian hacking forums, as well as malware distribution services. Yarochkin: One of the most valuable commodities on these forums is actually ICQ numbers. Even now, as of today, ICQ is one of the primary communication means...

From Russia with Love.exe 2: Virtual Currencies and Identity Dumps

The Grugq and Fyodor Yarochkin now move on to outline the prevalent payment methods on Russian hacking forums and touch upon the goods being traded on there. The Grugq: There’s some really cool identity stuff that they do as well. A lot of the money that gets moved around in these illegal economies is...

From Russia with Love.exe – The Russian Underground Hacking Culture

While participating in HITBSecConf Malaysia, security analysts The Grugq and Fyodor Yarochkin present their study of the ins and outs of the Russian hacking community, hacking forums and culture. The Grugq: Hi everyone. This is Fyodor, I’m Grugq by the way. What this talk is on is it’s basically on the...

HitmanPro 3 review

$24.95 SurfRight HitmanPro 3 is a splendid malware cleanup utility that works where others may fail. Usability:  Features:  Efficiency:  Support:  Overall:  Download The seeming unpretentiousness that the Netherlands-based SurfRight software house made their famous HitmanPro...

The Anatomy of Social Engineering 5: The Reality and Defenses

This entry encompasses the summary of how effectively social engineering exploits the quirks, or flaws, of the human brain, and provides some defense advice. So, in reality these are just tricks that statistically increase the odds of compliance (see right-hand image). And they’re obviously not going to...

The Anatomy of Social Engineering 4: Social Proof, Liking, Authority and Scarcity Flaws

The article continues to describe psychological quirks of the human brain, now focusing on four more flaws that tend to spontaneously affect one’s behavior. 3. Social Proof The next flaw that our brains have is that we try to do and think what other people who seem like us do and think (see right-hand...