Thursday, March 17, 2016

Cyber Criminals Hijack BBC, MSN and NYT Websites

Mainstream Websites including AOL, BBC and The New York Times Become Targets of Malvertising
A number of popular, high-profile websites have become targets of an extensive malvertising campaign. The websites attacked include many big names such as MSN, AOL, BBC, and The New York Times. Remember, this is not the first time for MSN to serve malicious adverts. In January 2015, the portal was dropping malware user PCs as part of a sophisticated malvertising campaign.



Malwarebytes reported that the malicious ads appeared out of nowhere and suddenly all the big publishing house websites got hit by it. The list of websites is pretty long as it included newsweek.com, my.xfinity.com, realtor.com, theweathernetwork.com, and thehill.com, etc., apart from the ones mentioned above.

This new wave of malvertising campaign involves installation of crypto-ransomware along with other malware through adverts on these websites. When users visit these sites, the malware easily gets transferred onto the users’ computer system.

Through such tainted ads, computers of hundreds and thousands of internet users have become affected. The malvertising campaign was identified by security firm Trend Micro and the details were revealed in its official blog post.

How it all started?

This campaign started off previous week with laced banner ads being pushed via an infected ad network and spread through Angler toolkit, Microsoft Silverlight and similar commonly used software.

Trustwave’s SpiderLabs group also published a blog post in which it was revealed that a JSON-based file is being distributed through these tainted ads. The file contains around 12,000 lines of code. When deciphered by security researchers, it was discovered that this obfuscated code enumerated a wide range of security tools and protocols, which it can avoid to remain unidentified.

According to Dabiel Chechik, Rami Kogan and Simon Kenin from SpiderLabs: “If the code doesn’t find any of these programs, it continues with the flow and appends an iframe to the body of the HTML that leads to Angler EK [exploit kit] landing page. Upon successful exploitation, Angler infects the poor victim with both the Bedep trojan and the TeslaCrypt ransomware–double the trouble.”

The infected ads aren’t only appearing on publishers or news websites but also on sites like answers.com and infolinks.com.

The domains from which these ads are being launched are associated with infected ad networks such as the most commonly appearing domain name is brentsmedia[.]com. trackmytraffic[c], biz and talk915[.]com, evangmedia[.]com and shangjiamedia[.]com.

It is being speculated by researchers that the attackers are making use of domain names that contain the term Media to make their infected domains appear as legitimate.

How to stay protected?

This campaign, however, highlights the important role that smart browsing plays in preserving our privacy and security while surfing the web. To avoid being exploited by malicious actors, security experts urge users to decrease their “attack surface,” which refers to uninstalling software like Oracle Java, Adobe Flash, Microsoft Silverlight, etc. In fact, users must delete all kinds of third party browser extensions that are unnecessary. Moreover, to ensure safe browsing, users must immediately install updates using the 64-bit Chrome version.


Wednesday, March 16, 2016

Android users be careful about Android Marcher Trojan Malware

Scammers are sending Porn Links for Spreading “Android Marcher Trojan”!

According to Security Researchers of Zscaler, scammers are sending porn themed links to Android users for spreading “Marcher Trojan”. Scammers are sending these type of links through emails and SMS to users. When users click on it, a window occur with an update of Adobe Flash Player. This update is Marcher Trojan in actual.

Scammers are very smart. They know that there is need of Adobe Flash Player plug-ins in Android devices to play a video clip. Users takes that Adobe Flash Update as legitimate one, but he didn’t know that he is downloading a Trojan. Security researchers of Zscaler said that scammers are running this campaign by sending 50 different types of links to the users.

How Marcher Trojan works?

This Trojan has been designed by the scammers to steal the financial information of the users through a phishing page. Scammers have designed a payment page, which look likes the legitimate payment page of “Google Play Store”. When user is interested to buy any application or products, this phishing page occurs and user fills the details of his credit card. This Trojan is also capable to steal the financial information with the help of already installed official bank apps. In that case, when user opens the official application of any bank, this Trojan superimpose a fake login page. This fake login page looks like original login page. When victim will insert his financial information, scammers will monitor that information with the help of Command and Control servers (C&C Servers).This Trojan is smart enough to hide itself behind the program files of Android Devices.

Deepen Desai is Head of Security Research at Zscaler and he told that, this fake phishing page looks like original payment webpage. This page occurs with a warning,” You will not be charged unless you make a purchase”. It is enough to Trick a normal user for stealing his financial information.

Researchers also said, “In many cases we have seen that this Trojan is asking the users to download “X-Video” application. This video application is rated as a safe application from Android team of Google. Scammers are using this trick to convince the users that they are filling their credit card information at right place.

How to avoid this Trojan?

According to researchers and security experts, always installed the applications from trusted application stores such as “Google Play Store”. All the third party application stores are full of malwares. Users can also avoid this Trojan by making a little change in their android device follow the steps.

Settings> Security> Install apps from Unknown Sources> Disable

Thursday, March 10, 2016

Users Security Tips on Fighting Ransomware

What is ransomware?
Ransomware is a malicious software that cyber criminals used to lock the computing device or the files stored thereon. When your device is infected with ransomware, it displays a message through a pop-up window, webpage, or email telling you that your device or files have been locked and you have to pay before you can access them again.

As there is no promising way to decrypt the affected files, it is important to avoid your device from being infected.

How to protect your device?
Beware of suspicious email. Do not open suspicious web links and attachments, especially compressed files (.zip,.7zip) or executable files (.exe).
Install security software and update to the latest signature.
Backup the important documents instantly and regularly. Keep the backups in a safe location to avoid being affected by malicious software.

If unfortunately your device is infected by malware, you are suggested to:
Isolate and disconnect the infected machine immediately to avoid further damage.
Download Microsoft Safety Scanner and perform a complete scanning to remove the malware.
Restore the files and data from backup.
If no backup has been done previously, do not restore the system to avoid losing information required for decryptions.
NEVER pay the ransom as there is no guarantee that the attackers will unlock your files!

 Source: OoPpSs Group & Malware Securities