phishing | Page 4


In the spirit of all the ghosts and ghouls that creep through our inboxes every day we posted a short quiz to see just how savvy our audience was at identifying phishing emails. The results are in and we cannot deny that we are slightly amused. We would like to thank everyone who participated, all 295 of you. The Results: The beginning of the quiz separated each respondent into one of 3 groups: -Absolute beginners -Your average netizen -Veteran security professionals As expected, the veterans scored just a little bit better than everyone else,... [Read More]
by RSS Michael Perna  |  Nov 12, 2013  |  Filed in: Industry Trends
Phishing is alive and well. Not a week goes by that I do not see some kind of malicious attempt to gather my information. Most of the time I am able to tell the difference between a phishing email and the good intentions of automated notification systems but there is always the rare case that a scam artist is more adept at spoofing than I am at recognizing the spoof. Can you tell the difference between a trick and a treat? Try your hand at the following quiz, marking "Trick" for a phishing email or "Treat" for the sincere. Share your results in... [Read More]
by RSS Michael Perna  |  Oct 30, 2013  |  Filed in: Industry Trends
By now, most are familiar with the concept of phishing , when an attacker baits a victim by sending out a persuasive social engineering message coupled with a malicious link or attachment. And even spear phishing , where the attacker similarly reels in an intended target, only with highly personal information available via social media and Internet searches. But SMShing? Perhaps not surprisingly, the same concept applies to SMS messages. As its name might suggest, SMShing is defined as the act of sending a fraudulent URL or phone number via SMS,... [Read More]
by RSS Stefanie Hoffman  |  Aug 14, 2013  |  Filed in:
Last month, Symantec blogged about an Android malware named Android.Fakedefender that is the first example of a Ransomware that we have seen on the Android platform. Fortinet detects this malware as Android/FakeDefend.A!tr The malware's operation can be broken down into 3 rough stages. For details of the modus operandus of this very sophisticated malware, read on.. CONVINCE USER THE PHONE IS INFECTED ('Fake AV' being the term of endearment for this in the security community) The malware disguises itself as an Anti-Virus application and,... [Read More]
by RSS Ruchna Nigam  |  Jul 12, 2013  |  Filed in: Security Research
Our previous post details the history of advanced persistent threats (APTs) as well as some of the most significant attacks, their origins and high-profile targets. In this post, we'll break down the stages of an attack, as well as APT attack tools and defensive solutions, as described by Fortinet's Richard Henderson's in the report "Threats on the Horizon: The Rise of the Advanced Persistent Threat." One of the many factors that distinguish advanced persistent threat (APT) attacks are their multiple components. First things first, though: The... [Read More]
by RSS Stefanie Hoffman  |  Jul 11, 2013  |  Filed in: Industry Trends
The concept behind advanced persistent threats (APTs) isn't new. Cybercriminals have been relying on advanced software to leverage attacks that steal data or disrupt systems since the dawn of the computer age. But what distinguishes modern APTs from previous advanced malware? According to Richard Henderson's Fortinet report "Threats on the Horizon: The Rise of Advanced Persistent Threats ," their distinguishing factors are sophistication and stealth, along with diverse attack vectors, copious resources and relentless perseverance. While the... [Read More]
by RSS Stefanie Hoffman  |  Jul 10, 2013  |  Filed in: Industry Trends
date: 2013-10-14 06:00:00 -0700 category: "Security Research" Final panel on collateral damage in cyber-warfare This post is the third in a three part series. Click here for Part 1 and here for Part 2 Fabio Assolini, Andrey Makhnutin - PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file) Proxy Auto Config are a so big problem in Bresil that Fabio renamed them "Problem Auto Config". They are very small malware which consist in just modifying the proxy server files browsers are meant to use. With Internet Explorer, the proxy... [Read More]
by RSS Axelle Apvrille  |  Jul 30, 2012  |  Filed in: Security Research
I had always wanted to look into Firefox OS. It's done. I created my first application. What kind of application does a reverse engineer write as first app? A CrackMe of course. You can try it: the sources are available here. But, honestly, it is really a very (very) simple CrackMe, as my real goal was to get acquainted with Firefox OS, and understand the possible risks in terms of malware. We, anti-virus analysts, won't need disassemblers or decompilers for Firefox OS malware That's cool, isn't it (although part of the mystery of our job is... [Read More]
by RSS Axelle Apvrille  |  Jul 30, 2012  |  Filed in: Security Research
We recently had a company contact us regarding an email they received from their bank. The company's access to its online banking account was blocked by its bank due to fraudulent activity observed through the account. A screenshot of the email received can be seen below. What I found extremely strange and suspicious about the email, and set the alarm bells ringing in my head, was the fact that the email contained 5 zip-compressed images as attachments. After going through it a second time, even the Anti-Virus link started to feel suspicious. Even... [Read More]
by RSS Ruchna Nigam  |  Jul 30, 2012  |  Filed in: Security Research
Last week the security world was abuzz with news of a new attack vector for mobile attacks. The malware was sent to the accounts of Tibetan human rights advocates and activists from the hacked account of one of the activists regarding the the World Uyghur Congress (WUC) Conference that took place in Geneva from 11-13 March, 2013. What made the piece of malware particularly interesting was the targeted nature of the attack, once again highlighting the political aspect of cyber warfare and making us question whether governments and legitimate organizations... [Read More]
by RSS Ruchna Nigam  |  Jul 30, 2012  |  Filed in: Security Research