Support

Archive | Spyware

View all postings from the Spyware category in “Security to the Core,” the Arbor Networks Security Engineering and Response Team Blog.

Happy Holidays: Point of Sale Malware Campaigns Targeting Credit and Debit Cards

Inside Recent Point-of-Sale Malware Campaign Activities Curt Wilson, Dave Loftus, Matt Bing An active Point of Sale (PoS) compromise campaign designed to steal credit and debit card data using the Dexter and Project Hook malware has been detected. Indicators of compromise will be provided for mitigation and detection purposes. Prior to the publication of this […]

Continue Reading

Things in 3FN

I think by this time folks know about the FTC action against 3FN (Triple Fiber Network). Here’s some of the stuff we had tracked there over the years. WinReanimator, Cutwail botnet activity. RogueAV in many forms including TubeStreamDrivers, av-pro-2009.com, do-make-progress.com, and related domains Pinch controllers Dialers Fake cracks and tools like Bosmedia.org Pushdo controllers manda.php […]

Continue Reading

Information Security and NFL Espionage

In late January 2007 several NFL-related web sites were hacked, to include www.dolphinsstadium.com and www.miamidolphins.com. Considering the Miami Dolphins stadium was about to host the NFL’s biggest game of the year, Superbowl XLI, this seemed a reasonable enough target. The sites were modified to serve malicious JavaScript code that would compromise victim’s computers, providing a […]

Continue Reading

When Spambots Attack — Each Other!

So, you’ve read plenty about when botnets attack. You’ve also seen plenty about when spambots attack, though it’s usually only in the form of spam email flooding in the course of spambot offspring performing the functions for which their creator intended. There’s even been plenty of press about when Botnets Battle Over Turf, attacking each […]

Continue Reading

AV, how cam’st thou in this pickle?

While I’ve seen and heard random spatterings about why AV isn’t effective, or analyst reports from the likes of Yankee declaring “AV is Dead”, there’s been very little qualitative or quantitative study on precisely why. Well, beyond the endless flurry of new malware families and subseqent offspring, that is.. As such, I find myself borrowing […]

Continue Reading