<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Jovi Umawing</title>
	<atom:link href="http://www.gfi.com/blog/author/jovi-umawing/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Scammers Invite Facebook Users to Test the New PS4, XBox 720</title>
		<link>http://www.gfi.com/blog/scammers-invite-facebook-users-to-test-the-new-ps4-xbox-720/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=scammers-invite-facebook-users-to-test-the-new-ps4-xbox-720</link>
		<comments>http://www.gfi.com/blog/scammers-invite-facebook-users-to-test-the-new-ps4-xbox-720/#comments</comments>
		<pubDate>Thu, 07 Mar 2013 14:06:12 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[Facebook scam]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[playstation 4]]></category>
		<category><![CDATA[ps4]]></category>
		<category><![CDATA[scammers using facebook create page]]></category>
		<category><![CDATA[scamming]]></category>
		<category><![CDATA[xbox 720]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10371</guid>
		<description><![CDATA[Exactly two weeks ago, Sony introduced the new PlayStation 4 (PS4) to the world in a press conference in New York. The only obvious problem that got people on the Web riled up was that Sony only showed the controller, &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/03/logo.png"><img class="alignleft size-thumbnail wp-image-10372" style="border: 0px; margin: 10px;" title="The Sony PlayStation Logo (in Blue)" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/logo-150x150.png" alt="" width="150" height="150" /></a> Exactly two weeks ago, <strong>Sony</strong> <a href="http://www.bbc.co.uk/news/technology-21526450">introduced</a> the new <strong>PlayStation 4 (PS4)</strong> to the world in a press conference in New York. The only obvious problem that got people on the Web riled up was that <a href="http://www.bbc.co.uk/news/technology-21528542">Sony only showed the controller</a>, with its new touchpad and light, and nothing but.</p>
<p>Earlier on, we spotted scam posts making rounds on <strong>Facebook</strong> from a very fake <strong>PlayStation Network</strong> profile created only hours ago. The scam post, which sported an image of a PS console, is being shared and liked by thousands of Facebook users, promising that whoever will be chosen to test the new product will get to keep the console after testing. It looked like this, initially.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/03/ps4-testers-wanted1.png"><img class="aligncenter size-medium wp-image-10373" title="Wanted: PS4 Testers (variant 1)" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/ps4-testers-wanted1-300x283.png" alt="" width="300" height="283" /></a><em>click to enlarge</em></p>
<blockquote><p><em>Sony needs testers for the new PlayStation 4. You will go to keep the new PS4 after you&#8217;ve tested it&#8230;..</em></p>
<p><em>If you want to be a tester for the new PS4 just share this photo and like our page.</em></p>
<p><em>People will be chosen completely at random!</em></p>
<p><em>~ Sony</em></p></blockquote>
<p>Not long after that, someone was kind enough to point out in the Facebook comment that the new PS4 has touchpad while the one showed in the post doesn&#8217;t have one. Perhaps this was what fuelled the scammers to update the image, like so:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/03/ps4-testers-wanted2.png"><img class="aligncenter size-medium wp-image-10374" title="Wanted: PS4 Testers (variant 2)" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/ps4-testers-wanted2-300x280.png" alt="" width="300" height="280" /></a><em>click to enlarge</em></p>
<p>32,656 shares compared to the 30,425 shares before. Facepalm.</p>
<p>There were also those who realized that the profile was a fake (created yesterday) and attempted to help everyone see this as well. Alas, they are none the wiser.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/03/fake-ps4-comments.png"><img class="aligncenter size-medium wp-image-10375" title="Screenshot of actual comments from the fake PS4 testing invitation" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/fake-ps4-comments-203x300.png" alt="" width="203" height="300" /></a><em>click to enlarge</em></p>
<p> Let us then look at the fake Facebook profile in question.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/03/bogus-ps4-fb-profile.png"><img class="aligncenter size-medium wp-image-10376" title="Screenshot of the fake PSN Facebook profile" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/bogus-ps4-fb-profile-300x220.png" alt="" width="300" height="220" /></a><em>click to enlarge</em></p>
<p>To the untrained eye, one may not notice immediate that the URL format of the profile page is unlike what we normally see popular brands use and point users to, which is the more straightforward and memorable format, <em>facebook.com/{company, product or service name}</em>. This is because the scammers behind this fakeout used Facebook&#8217;s own <em>Create Page</em> feature that can be found in the <em>Recommended Pages</em> section of a profile.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/03/recpage-create-page.png"><img class="aligncenter size-medium wp-image-10378" title="Recommended Pages &gt; Create page" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/recpage-create-page-300x124.png" alt="" width="300" height="124" /></a><em>click to enlarge</em></p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/03/recpage-create-page2.png"><img class="aligncenter size-medium wp-image-10379" title="Create a Page &gt; Brand or product" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/recpage-create-page2-300x235.png" alt="" width="300" height="235" /></a><em>click to enlarge</em></p>
<p>The scammers then select <em>Brand or product</em> where the &#8220;Games/Toys&#8221; category (the &#8220;business type&#8221; these scam profiles classify themselves) can be found.</p>
<p>Elsewhere, <strong>Microsoft</strong> is calling for <strong>XBox 720</strong> testers!</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/03/fake-xbox-testers.png"><img class="aligncenter size-medium wp-image-10380" title="Wanted: XBox 720 Testers" src="http://www.gfi.com/blog/wp-content/uploads/2013/03/fake-xbox-testers-300x282.png" alt="" width="300" height="282" /></a><em>click to enlarge</em></p>
<blockquote><p><em>Xbox needs testers for the news Xbox 720. You will get to keep the new Xbox 720 after you&#8217;ve tested it&#8230;..</em></p>
<p><em>If you want to be a tester for the new 720 just share the photo and like the The Next Xbox and we will choose people at random.</em></p>
<p><em>~ Microsoft.</em></p></blockquote>
<p>Or maybe not.</p>
<p>Scammers behind this Facebook campaign are also employing the same tactics used by the PS4 scammers.</p>
<p>If ever you encounter any of the posts we mentioned above on Facebook, don&#8217;t attempt to share it further with your network. Ignore it, and inform whoever is sharing the faux &#8220;Testers Wanted!&#8221; announcement that it&#8217;s a scam.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/scammers-invite-facebook-users-to-test-the-new-ps4-xbox-720/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Valentine&#8217;s Day Threats: That Front Called &#8220;Love&#8221;</title>
		<link>http://www.gfi.com/blog/valentines-day-threats-that-front-called-love/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=valentines-day-threats-that-front-called-love</link>
		<comments>http://www.gfi.com/blog/valentines-day-threats-that-front-called-love/#comments</comments>
		<pubDate>Thu, 14 Feb 2013 14:56:41 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10331</guid>
		<description><![CDATA[If there is one thing Valentine&#8217;s Day, Halloween, Thanksgiving and Christmas have in common, it&#8217;s online threats. We know this. But among these special occasions that we eagerly anticipate and almost don&#8217;t fail to celebrate, Valentine&#8217;s Day is probably the most personal &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/02/shutterstock_122015482.jpg"><img class="alignleft size-thumbnail wp-image-10332" style="border: 0px; margin: 10px;" title="Falling hearts" src="http://www.gfi.com/blog/wp-content/uploads/2013/02/shutterstock_122015482-150x150.jpg" alt="" width="150" height="150" /></a>If there is one thing <strong>Valentine&#8217;s Day</strong>, <strong>Halloween</strong>, <strong>Thanksgiving</strong> and <strong>Christmas</strong> have in common, it&#8217;s online threats. We know this. But among these special occasions that we eagerly anticipate and almost don&#8217;t fail to celebrate, Valentine&#8217;s Day is probably the most personal because it deals directly with certain matters of the heart. And when it comes to love, as we also know, things are really not that simple.</p>
<p>On this day of hearts, chocolates, flowers and (for some) celebration of singlehood, we&#8217;ll be highlighting the popular online threats banking on this occasion, most of which are disappearing and resurfacing through the years. After that, we&#8217;ll be dishing out some security tips that hopefully you, dear Reader, will be strongly reminded of, not just today but also the days to come.</p>
<h2><em><strong>The Multifaceted Spam</strong></em></h2>
<p>Have you clicked a link in what appears to be a sleek-looking Valentine&#8217;s Day e-card from a good friend you haven&#8217;t had the opportunity to talk to in two years? If you answer &#8216;yes&#8217;, don&#8217;t worry, you won&#8217;t be the last to fall for this.</p>
<p>Email spam has been around since <a href="http://en.wikipedia.org/wiki/ARPANET">the age of ARPANET</a>. Historically, <a href="http://www.geekosystem.com/first-spam-email/">the first email spam</a> was sent during this age in 1978, eight years earlier than the discovery of the first computer virus called <a href="http://en.wikipedia.org/wiki/Brain_(computer_virus)">BRAIN</a>.</p>
<p>Valentine&#8217;s Day spam runs either aim to download malware onto user systems, with or without user consent, or aim to steal information and <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/itunes-  invoices-and-valentines-ads-conceal-pharma-spam/">money</a>. Such campaigns range from fake e-cards; mails allegedly containing links to videos, songs, poetry and pictures; purported promotions for flowers, romantic dinners, jewelry, and other gift-related theme; scammers even went with <a href="http://www.symantec.com/connect/blogs/cyber-threats-increase-around-valentine-s-day">fake discount codes</a> to make the offer a bit more irresistible.</p>
<h2><em><strong>Online Dating Shenanigans</strong></em></h2>
<p><a href="http://digitallife.today.com/_news/2013/01/04/16347129-looking-for-love-in-the-new-year-online-dating-peaks-in-january?lite">Data recently released by Match.com</a> four days after the new year of 2013 showed that visitors of online dating sites have peaked, which led some to think that &#8220;the very best moment in the entire year [is the most suitable time] to seek out a partner&#8221;. Although it has been <a href="http://www.informationweek.com/security/privacy/looking-for-love-dont-trust-online-datin/232600821">ill-advised</a> to merely rely on dating sites in finding The One, entertaining and acting on that very probable &#8220;what if&#8221; isn&#8217;t a thing someone can just shake off easily.</p>
<p>Those dabbling in online dating I know consider themselves &#8220;cautious,&#8221; knowing full-well that with the promise of having a life-long partner also comes the possibility of <a href="http://security-today.com/blogs/reaction/2012/07/batman-killings-are-we-no-longer-safe-at-the-movies.aspx">meeting Mr. or Ms. Wrong</a>, and that&#8217;s fine. However, one must also look at the possible dangers that may be encountered online. Threats, such as <a href="http://www.businessinsider.com/notre-dame-manti-teo-hoax-press-conference-2013-1">catfishing</a>, <a href="http://venturebeat.com/2012/10/30/online-dating-scam/">profile spoofing</a> and <a href="http://abcnews.go.com/Technology/online-dating-scam-military-guy-steals-500000-widow/story?id=14904669">fraud</a> are huge points of concern within this industry, too. ThreatMatrix published a graphical representation of stats of criminal activities going on in online dating that you may want to check out <a href="http://www.businessinsider.com/threatmetrix-online-dating-scam-graphic-2013-2">here</a>.</p>
<p>Moreover, some dating sites <a href="http://www.upi.com/Science_News/2012/01/13/Security-of-Internet-dating-sites-examined/UPI-15061326504004/">fail to keep their users&#8217; personally identifiable information (PII) private</a> while <a href="http://www.idt911blog.com/2013/01/dating-sites-that-love-your-privacy/">some do keep it safe</a>. Hacked sites? Yes, <a href="http://arstechnica.com/security/2012/06/eharmony-confirms-member-passwords-compromise/">we&#8217;ve seen that happen with eHarmony</a> not so long ago, following <a href="http://arstechnica.com/security/2012/06/8-million-leaked-passwords-connected-to-linkedin/">the hack on LinkedIn</a>.</p>
<h2><em><strong>Love, Socially</strong></em></h2>
<p>In this age of social sharing, a <strong>Facebook</strong> post, <strong>Twitter</strong> tweet and <strong>Tumblr</strong> reblog can reveal a lot about a person: their thoughts, feelings, cravings. A post, tweet and reblog can also the state of the owners account: <a href="http://www.welivesecurity.com/2012/02/07/valentines-day-scams-for-the-love-of-money/">compromised, possibly fake, actively spamming</a>.</p>
<p>It has been said before: careful what you share online, but if one can&#8217;t tell the difference between a legitimate source from the bogus one, here lies the problem. <a href="http://www.gfi.com/blog/happy-valentines-derp/">We&#8217;ve seen a sample of this last year</a> when Tumblr users began reblogging free <strong>Victoria&#8217;s Secret</strong> gift cards, and the alleged source being the Tumblr Staff Blog account.</p>
<h2><em><strong>Head Over Heart: The Right Kind of &#8220;Love&#8221; </strong></em></h2>
<p>Surely, we can&#8217;t stop those from clicking links on e-cards, going to online dating sites in pursuit of true love and not sharing freebies and what-nots during Valentine&#8217;s Day; however, what we can do is help those make informed choices before they do something heartbreaking. Here are a couple of tips:</p>
<ul>
<li><strong>Trust, but verify. </strong>It never hurts to thank and ask this friend of two years you hardly spoke to if they indeed sent the email or not. One doesn&#8217;t have to click on links to find out because by then, it might already be too late.This applies to things shared on social networking sites, too.</li>
<li><strong>Repeat after me: TMI.</strong> It stands for &#8220;too much information&#8221;. Keep it in mind when talking with someone you just met online (may it be on a dating or social networking site or forum) and want to get to know better. A touch of mystery and maybe a pound of paranoia may actually be good allies. After all, some things are still best said face to face.</li>
</ul>
<p>Imbibe these two simple and practical tips as life lessons if you must. They may not only save you the heartache but also the headache of having your system be rid of malware, reclaiming stolen information or wondering why your soon-to-be partner in life hasn&#8217;t called you yet after sending them a huge amount of cash.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/valentines-day-threats-that-front-called-love/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fake Adobe Flash Updates Resurface on the Web</title>
		<link>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-adobe-flash-updates-resurfaces-in-the-web</link>
		<comments>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/#comments</comments>
		<pubDate>Thu, 24 Jan 2013 15:32:29 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[BBB]]></category>
		<category><![CDATA[Better Business Bureau]]></category>
		<category><![CDATA[eFax]]></category>
		<category><![CDATA[efax corporate]]></category>
		<category><![CDATA[fake adobe flash player]]></category>
		<category><![CDATA[fake google chrome]]></category>
		<category><![CDATA[pony downloader]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10198</guid>
		<description><![CDATA[Following the return of fake Google Chrome browser updates almost two weeks ago, online criminals are now banking on fake Adobe Flash Player updates to lure the unwary user into downloading malware onto their system. Matthew and Robert, two of our &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/fake-flash-logo-avatar.png"><img class="alignleft size-thumbnail wp-image-10199" style="border: 0px; margin: 10px;" title="Fake Adobe Flash Player Update" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/fake-flash-logo-avatar-150x150.png" alt="" width="150" height="150" /></a>Following the return of <a href="http://www.gfi.com/blog/fake-google-chrome-updates-return/">fake <strong>Google Chrome</strong> browser updates</a> almost two weeks ago, online criminals are now banking on fake <strong>Adobe Flash Player</strong> updates to lure the unwary user into downloading malware onto their system.</p>
<p>Matthew and Robert, two of our researchers in the AV Labs, discovered this upon digging deeper into spam emails claiming to be from the <a href="http://gfisoftware.tumblr.com/post/41205966325/ny-better-business-bureau-attachment-spam"><strong>Better Business Bureau (BBB)</strong></a> and <strong><a href="http://gfisoftware.tumblr.com/post/41285616866/efax-corporate-message-spam">eFax Corporate</a>. </strong>Complete email details of these spam have documented in our <a href="http://gfisoftware.tumblr.com/">GFI Software Tumblr site</a>.</p>
<p>The BBB email contains an attachment that is found to be a <a href="http://www.vipreantivirus.com/"><strong>Pony downloader</strong></a> that, once opened, downloads a variant of the <a href="http://www.gfi.com/blog/?s=zeus&amp;x=17&amp;y=19"><strong>ZeuS</strong></a> banking Trojan onto the affected user&#8217;s system. The said downloader also steals various passwords related to FTP sites.</p>
<p>One of the URLs that the Pony downloader calls back to is a domain served on the IP address <em>74(dot)91(dot)117(dot)49</em>, which is found to host other malicious files like the <a href="http://threatpost.com/en_us/blogs/black-hole-exploit-kit-20-released-091212"><strong>Blackhole Exploit Kit 2.0</strong></a>, <a href="http://blogs.technet.com/b/mmpc/archive/2012/09/10/msrt-september-12-medfos-hijacking-your-daily-search.aspx"><strong>Medfos</strong></a> (a Trojan downloader that hijacks search results), the <strong>Simda rootkit</strong>, the <a href="http://malwareprotectioncenter.com/2011/07/16/personal-shield-pro-rogue-of-the-winweb-security-family/"><strong>WinWeb Security</strong></a> <a href="http://malwareprotectioncenter.com/"><strong>rogue AV</strong></a>, and ZeuS.</p>
<p>The following compromised domains are found to be hosted on the above IP:</p>
<ul>
<li>13(dot)carnovirious(dot)net</li>
<li>13(dot)blumotorada(dot)net</li>
<li>13(dot)lomerdaster(dot)net</li>
<li>13(dot)jonemnominik(dot)net</li>
<li>13(dot)zabakarvester(dot)net<span style="text-align: center;"> </span></li>
</ul>
<p style="text-align: left;">Below is a sample screenshot of one of the compromised sites hosting the fake Google Chrome update:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-chrome.png"><img class="aligncenter size-medium wp-image-10201" title="Screenshot of fake Google Chrome update page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-chrome-300x215.png" alt="" width="300" height="215" /></a><em>click to enlarge</em></p>
<p>And here is a sample screenshot of the malicious IP hosting a fake Adobe Flash Player update:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-flash.png"><img class="aligncenter size-medium wp-image-10202" title="Screenshot of the fake Adobe Flash Update page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-flash-300x167.png" alt="" width="300" height="167" /></a><em>click to enlarge</em></p>
<p>When it comes to updating software installed in your systems, it is still best to visit their official websites. Free update checkers, such as the FileHippo program, can also assist users in managing software that needs updating in real-time.</p>
<p>Related posts:</p>
<ul>
<li><a href="http://www.gfi.com/blog/adp-spam-campaigns-are-in-the-wild/">ADP Spam Campaigns are in the Wild</a></li>
<li><a href="http://www.gfi.com/blog/this-spam-gives-recipients-a-second-chance/">This Spam Gives Recipients a Second Chance</a></li>
<li><a href="http://www.gfi.com/blog/news-of-brazils-former-presidents-death-leads-to-malware/">News of Brazil’s Former President’s Death Leads to Malware</a></li>
<li><a href="http://www.gfi.com/blog/fake-flash-player-fun/">Fake Flash Player Fun</a></li>
</ul>
<p>Jovi Umawing (Thanks to Matthew and Robert)</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Phishing Scam Spreads via Facebook PM</title>
		<link>http://www.gfi.com/blog/phishing-scam-spreads-via-facebook-pm/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishing-scam-spreads-via-facebook-pm</link>
		<comments>http://www.gfi.com/blog/phishing-scam-spreads-via-facebook-pm/#comments</comments>
		<pubDate>Wed, 23 Jan 2013 16:06:05 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[facebook pm]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[twitter dm]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10148</guid>
		<description><![CDATA[We&#8217;ve seen a number of cases wherein phishers have used compromised Twitter accounts to send direct messages (DMs) to their followers. We&#8217;re now beginning to see this same tactic used in Facebook in the form of private messages (PMs), and this isn&#8217;t &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/dont-like.png"><img class="alignleft size-thumbnail wp-image-10149" style="border: 0px; margin: 10px;" title="Me No Like Dis" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/dont-like-150x150.png" alt="" width="150" height="150" /></a> We&#8217;ve seen a number of cases wherein phishers have used compromised <strong>Twitter</strong> accounts to send direct messages (DMs) to their followers. We&#8217;re now beginning to see this same tactic used in <strong>Facebook</strong> in the form of private messages (PMs), and this isn&#8217;t just <a href="http://www.hoax-slayer.com/private-message-phishing-survey.shtml">some spam mail in your inbox claiming you have received a &#8220;private message&#8221;</a>.</p>
<p>As of writing, the PM looks like this:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/00-FB-private-message.png"><img class="aligncenter size-medium wp-image-10192" title="Screenshot of the Facebook private message being dropped in inboxes" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/00-FB-private-message-300x137.png" alt="" width="300" height="137" /></a><em>click to enlarge</em></p>
<blockquote><p><em>WARNING: Your account is reported to have violated the policies that are considered annoying or insulting Facebook users.system will disable your account within 24 hours if you do not do the reconfirmation. Please confirm your Facebook account below:</em></p>
<p><em>[URL redacted]</em></p></blockquote>
<p>Recipients can act on this message in two ways: they can click the link to confirm their account, or simply ignore the message and delete it from their message inbox. Users who do the latter are guaranteed to be safe from this sort of scam. Users who do the former, however, are led to a single site where they can enter all personal information asked from them. Below are screenshots of the pages in the order of how they will appear to users:</p>
<ol>
<li>The first page is a something most Internet users are conditioned to seeing: a “prompt” telling users what they’re about to do and why they have to do it.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/01-security-check-page.png"><img class="aligncenter size-medium wp-image-10193" title="Page 1: The .GG phishing page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/01-security-check-page-300x170.png" alt="" width="300" height="170" /></a><em>click to enlarge</em></p>
</li>
<li>Clicking the <em>Continue </em>button leads users to the second bit where it asks for their basic personal information and credentials (email and password) used to log in to Facebook.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/02-confirm-your-identity.png"><img class="aligncenter size-medium wp-image-10194" title="Page 2: Confirm your identity" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/02-confirm-your-identity-300x212.png" alt="" width="300" height="212" /></a><em>click to enlarge</em></p>
</li>
<li>Next, users might think that this is is a peculiar one as it asks them to select the webmail service the email address you entered in the previous page is under. For example, if the email you use to sign in on Facebook is a Gmail address, then you have to select “Gmail” from the drop-down option box.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/03-confirm-your-webmail.png"><img class="aligncenter size-medium wp-image-10195" title="Page 3: Confirm your webmail" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/03-confirm-your-webmail-300x214.png" alt="" width="300" height="214" /></a><em>click to enlarge</em></p>
</li>
<li>The fourth page is an interesting one: It asks users to enter only the first six digits of their payment card (debit or credit card) number, regardless of whether they have used their card to buy Facebook Credits or not. Unfortunately, there is no option to skip this part.
<p>In case you’re wondering, the first six digits of a credit or debit card is the <a href="http://en.wikipedia.org/wiki/Bank_card_number#Issuer_identification_number_.28IIN.29">Issuer Identification Number (IIN)</a>, which identifies the issuer (VISA, MasterCard, American Express, etc.) of the card.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/04-payment-verification-1.png"><img class="aligncenter size-medium wp-image-10196" title="Page 4: First page of &quot;Payment Verification&quot;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/04-payment-verification-1-300x197.png" alt="" width="300" height="197" /></a><em>click to enlarge</em></p>
</li>
<li>Just when you think that all that’s needed is the first six digits of their payment card, users find out that they have to give the complete card number after all, and then some more.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/05-payment-verification-2.png"><img class="aligncenter size-medium wp-image-10197" title="Page 5: Second page of &quot;Payment Verification&quot;" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/05-payment-verification-2-300x226.png" alt="" width="300" height="226" /></a><em>click to enlarge</em></p>
</li>
</ol>
<p>Once all five &#8220;verification&#8221; pages have been filled out, dear Reader, consider yourself phished and expect your account to send out the same PM you received to your Facebook network.</p>
<p>Unsolicited messages from phishers landing on your private message inbox are no longer limited to Twitter. Despite this old method being used in a different platform, our advice on how to avoid falling for such scams remain the same: Always check the URL to be sure you&#8217;re not going to visit a link that is completely unrelated to Facebook—&#8221;Think before you click&#8221;, remember?; be skeptical about messages claiming to have come from Facebook; lastly, never share the URL to anyone on Facebook or on your other social sites as this only increases the possibility of someone clicking the link and getting phished themselves.</p>
<p>Jovi Umawing (Thanks to Janne for the heads up)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/phishing-scam-spreads-via-facebook-pm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Phishers Target UnionBank of the Philippines Clients</title>
		<link>http://www.gfi.com/blog/phishers-target-unionbank-of-the-philippines-clients/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishers-target-unionbank-of-the-philippines-clients</link>
		<comments>http://www.gfi.com/blog/phishers-target-unionbank-of-the-philippines-clients/#comments</comments>
		<pubDate>Mon, 21 Jan 2013 11:10:17 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[PayPal]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[union bank of the philippines]]></category>
		<category><![CDATA[unionbank]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10168</guid>
		<description><![CDATA[We have been alerted by an ongoing phishing campaign that targets clients and online banking users of the UnionBank of the Philippines. The phishing URL, which is being sent to users in the form of spam, is found hosted on &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/unionbank-phish-ava.png"><img class="alignleft size-thumbnail wp-image-10169" style="border: 0px; margin: 10px;" title="You know it's phishing when...." src="http://www.gfi.com/blog/wp-content/uploads/2013/01/unionbank-phish-ava-150x150.png" alt="" width="150" height="150" /></a> We have been alerted by an ongoing <a href="http://www.gfi.com/malware-analysis-tool"><strong>phishing</strong></a> campaign that targets clients and online banking users of the <strong>UnionBank of the Philippines</strong>. The phishing URL, which is being sent to users in the form of spam, is found hosted on a legitimate but compromised Russian domain. We have also found previous records of the said domain hosting a different phishing page a few days ago.</p>
<p>The spam entices users to visit a certain URL to &#8220;reactivate&#8221; their account. Once the URL is clicked, users are then directed to the following page:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/UBP-phishing-page-01.png"><img class="aligncenter size-medium wp-image-10170" title="Union Bank of the Philippines phishing page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/UBP-phishing-page-01-300x148.png" alt="" width="300" height="148" /></a><em>click to enlarge</em></p>
<p>This phishing page has closely mimicked the look or template of legitimate pages where users can enter their sensitive banking information. The sample screenshot below is just one of several pages in the UnionBank website that uses the template.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/UBP-legit-enroll.png"><img class="aligncenter size-medium wp-image-10171" title="Legitimate enrollment page of UnionBank" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/UBP-legit-enroll-300x134.png" alt="" width="300" height="134" /></a><em>click to enlarge</em></p>
<p>Once users have entered and submitted their information, a confirmation window pops up and then users are redirected to the legitimate UnionBank website.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/UBP-phishing-page-02.png"><img class="aligncenter size-medium wp-image-10172" title="The phishing page's pop-up message" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/UBP-phishing-page-02-300x193.png" alt="" width="300" height="193" /></a><em>click to enlarge</em></p>
<p>Most UnionBank users have their <strong>PayPal</strong> accounts tied to their banking accounts, so it is very important to steer clear from emails claiming to be from the bank that ask for banking details. If you, dear Reader, are indeed their client, better call them and inquire about the email you receive just to be sure. It also pays to consult this <a href="http://www.unionbankph.com/index.php?option=com_content&amp;view=article&amp;id=1083&amp;Itemid=472">Anti-Fraud and Anti-Phishing Guidelines page</a> from UnionBank for guidance on how to identify phishing pages from the real ones.</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/phishers-target-unionbank-of-the-philippines-clients/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Year, New Old Threats</title>
		<link>http://www.gfi.com/blog/new-year-new-old-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-year-new-old-threats</link>
		<comments>http://www.gfi.com/blog/new-year-new-old-threats/#comments</comments>
		<pubDate>Wed, 09 Jan 2013 10:35:37 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[email threats]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[facebook credits]]></category>
		<category><![CDATA[Facebook scam]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[squirrelmail]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10110</guid>
		<description><![CDATA[If there&#8217;s one thing we have to remember about certain Web threats—specifically those related to social networking and social media sites—and email threats, it is this: oftentimes, they come back to haunt us. Case in point, we have found an old &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/fb-credits-scam-avatar.jpg"><img class="alignleft size-thumbnail wp-image-10111" title="Guess what's back?" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/fb-credits-scam-avatar-150x150.jpg" alt="" width="150" height="150" /></a> If there&#8217;s one thing we have to remember about certain Web threats—specifically those related to social networking and social media sites—and email threats, it is this: oftentimes, they come back to haunt us.</p>
<p>Case in point, we have found an old <a href="http://www.gfi.com/blog/?s=facebook+scam&amp;x=19&amp;y=25"><strong>Facebook</strong> <strong>scam</strong></a>, which dates back from two years ago, making rounds again and a <strong><a href="http://www.gfi.com/exchange-server-antispam-antivirus">spam</a>-<a href="http://www.gfi.com/blog/?s=phishing&amp;x=25&amp;y=17">phishing</a></strong> ploy that is so 2007. Let&#8217;s see if any of these bring back memories&#8230;.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-random-fb-status-credit.png"><img class="aligncenter size-medium wp-image-10112" title="Random Facebook comment on a Facebook game page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-random-fb-status-credit-300x155.png" alt="" width="300" height="155" /></a><em>click to enlarge</em></p>
<p>Familiar? This status message tells visitors that they can get 5,000 free <a href="https://www.facebook.com/credits/"><strong>Facebook credits</strong></a> by joining a promo (on a limited offer) and points them to a URL where they can join. Of course, in actuality, there is no promo and no free credits to be given away.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-credits-scam-site.png"><img class="aligncenter size-medium wp-image-10113" title="Screenshot of the Facebook Credits scam site" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-credits-scam-site-240x300.png" alt="" width="240" height="300" /></a><em>click to enlarge</em></p>
<p><a href="http://facecrooks.com/Scam-Watch/1000-Free-Facebook-Credits-scams-hit-Facebook-Full-Force-558.html">Previous versions</a> of this scam usually asks visitors to click &#8220;Like&#8221; buttons for pages, a method usually employed for the purpose of increasing the popularity of pages and <a href="http://daylandoes.com/facebook-like-scams/">their monetary value</a> once sold. For the scam to proliferate within the network, users are also asked to update their Facebook profile with the above status message and link. Some versions present either a list of surveys to fill in or a form where users can enter their mobile numbers; only this latest scam offers both.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fb-credits-survey.png"><img class="aligncenter size-medium wp-image-10115" title="Screenshot of the Facebook Credit survey page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fb-credits-survey-300x198.png" alt="" width="300" height="198" /></a><em>click to enlarge</em></p>
<p>If you, dear Reader, have encountered the said Facebook scam, it is best to steer clear. If you have already fallen to this scam, it is best to clean your feed by deleting the posts you created and unclicking the &#8220;Like&#8221; buttons of pages you&#8217;ve liked.</p>
<p>***</p>
<p>Our researchers in the AV Labs found an in-the-wild email spam leading to a phishing attack. It targets users of the open-source webmail application, <strong><a href="http://en.wikipedia.org/wiki/SquirrelMail">SquirrelMail</a></strong>.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-squirrelmail-phish.png"><img class="aligncenter size-medium wp-image-10114" title="Screenshot of the fake SquirrelMail phishing site" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-squirrelmail-phish-300x176.png" alt="" width="300" height="176" /></a><em>click to enlarge</em></p>
<p>The <a href="http://gfisoftware.tumblr.com/post/39933563213/squirrelmail-credentials-phish">email</a> is exactly as it was back in 2007, so any user can take their cues from the outdated versions of the app mentioned and the supposed solution to the issue the email is attempting to address. My advice? Delete the spam at once.</p>
<p>Jovi Umawing (Thanks for the AV Labs for the spam find)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/new-year-new-old-threats/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Profile Spy Resurrects on Eve of Mayan Apocalypse</title>
		<link>http://www.gfi.com/blog/profile-spy-resurrects-on-eve-of-mayan-apocalypse/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=profile-spy-resurrects-on-eve-of-mayan-apocalypse</link>
		<comments>http://www.gfi.com/blog/profile-spy-resurrects-on-eve-of-mayan-apocalypse/#comments</comments>
		<pubDate>Thu, 20 Dec 2012 23:38:25 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[ad injector]]></category>
		<category><![CDATA[Adware.FSpy]]></category>
		<category><![CDATA[End of the World]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[mayan]]></category>
		<category><![CDATA[profile spy]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[twitter]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10054</guid>
		<description><![CDATA[Ah, Profile Spy, a once viral scam on Facebook and Twitter that entices users to check out who have been viewing their profiles. Today, on the eve of the rumored EoW, it has decided to rear its ugly head once more. &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/373056_498263800214070_164453013_n.jpg"><img class="alignleft size-thumbnail wp-image-10055" style="border: 0px; margin: 10px;" title="Profile Spy logo" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/373056_498263800214070_164453013_n-150x150.jpg" alt="" width="150" height="150" /></a>Ah, <strong>Profile Spy</strong>, a once viral scam on <a href="http://www.gfi.com/blog/profile-watch-pops-surveys-on-facebook/"><strong>Facebook</strong></a> and <strong>Twitter </strong>that entices users to check out who have been viewing their profiles.</p>
<p>Today, on the eve of the rumored <a href="http://www.vipreantivirus.com/promos/end-of-days/">EoW</a>, it has decided to rear its ugly head once more.</p>
<p>During Profile Spy&#8217;s random stints on the Web, we have observed that the criminals behind it have used a number of tactics to make users hand over their credentials or give them money—like asking users to &#8220;Like&#8221; their page, answer surveys and copy and paste a code into the address bar. This time, the scammers have used a lot of elements in this effort. One is Facebook, the other two are <strong>Tumblr </strong>and the <strong>Google Chrome Web Store</strong>.</p>
<p>This scam starts off as a Facebook event invitation spammed to random users who are part of the mark&#8217;s network, a social engineering tactic already done in the past. Since the &#8220;event&#8221; is public, anyone can visit the page if the URL is shared.</p>
<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/spammed-ps-event-invitation.png"><img class="aligncenter size-full wp-image-10056" title="spammed-ps-event-invitation" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/spammed-ps-event-invitation.png" alt="" width="342" height="114" /></a></p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/ps-fb-event-page.png"><img class="aligncenter size-medium wp-image-10057" title="The &quot;Profile Spy&quot; Facebook event page" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/ps-fb-event-page-300x222.png" alt="" width="300" height="222" /></a><em>click to enlarge</em></p>
<p>Visiting any of the links on the comment posted on the page leads users to a Tumblr profile. Clicking &#8220;Get it here&#8221; then leads users to a similar looking page, which is using <strong>Amazon</strong>&#8216;s web service, where they can download the <strong>Facebook Profile Spy v2.0</strong> for the <strong>Google Chrome</strong> Internet browser.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-ps-tumblr1.png"><img class="aligncenter size-medium wp-image-10058" title="Default page of Profile Spy on Tumblr" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-ps-tumblr1-300x203.png" alt="" width="300" height="203" /></a><em>click to enlarge</em></p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-ps-tumblr2.png"><img class="aligncenter size-medium wp-image-10059" title="Page where users can now add the extension to Chrome" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-ps-tumblr2-300x202.png" alt="" width="300" height="202" /></a><em>click to enlarge</em></p>
<p>Based on the Web page&#8217;s code, only users from certain countries can download and install the Profile Spy rogue extension onto their Chrome browser once they click &#8220;Add to Chrome&#8221;. Users outside of these countries won&#8217;t be able to experience this. Below is a screenshot of the extension&#8217;s page that is being served on the Chrome Web Store:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/chrome-extension.png"><img class="aligncenter size-medium wp-image-10061" title="The rogue extension's page being served on the Google Chrome Web Store" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/chrome-extension-300x180.png" alt="" width="300" height="180" /></a><em>click to enlarge</em></p>
<p>File name: <em>extension_1_0_1.crx;</em> MD5: 27f74e08871094fad6446686847b709d.</p>
<p>This rogue extension, once installed, is capable of doing three things: firstly, it updates the mark&#8217;s Facebook status by sharing an image and commenting on it—</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/ps-fb-comment.png"><img class="aligncenter size-medium wp-image-10062" title="Facebook comment post" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/ps-fb-comment-295x300.png" alt="" width="295" height="300" /></a><em>click to enlarge</em></p>
<p>—secondly, the extension displays a fake &#8220;security CAPTCHA check&#8221; pop-up window where the mark can fill in names of persons in his/her network. This then results in the creation of the Profile Spy &#8220;event&#8221; invitation—</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-captcha.png"><img class="aligncenter size-medium wp-image-10063" title="Fake CAPTCHA pop-up window on Facebook" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-captcha-300x172.png" alt="" width="300" height="172" /></a><em>click to enlarge</em></p>
<p>—and lastly, it inserts ads, most of them adult in nature, on <em>every</em> website the mark visits. Below are just some sample screenshots:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/ads-google.png"><img class="aligncenter size-medium wp-image-10064" title="Screenshot of ads injected to the default Google search page" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/ads-google-300x213.png" alt="" width="300" height="213" /></a><em>click to enlarge</em></p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/search-result-adult-ad.png"><img class="aligncenter size-medium wp-image-10065" title="Screenshot of a search result page with an adult ad" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/search-result-adult-ad-300x145.png" alt="" width="300" height="145" /></a><em>click to enlarge</em></p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/adult-ad-yahoo.png"><img class="aligncenter size-medium wp-image-10066" title="Screenshot of adult ad on Yahoo! default page" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/adult-ad-yahoo-300x183.png" alt="" width="300" height="183" /></a><em>click to enlarge</em></p>
<p>As a last act of getting as much as they can from their mark, the scammers display a pop-up survey after the extension is successfully installed for the mark to fill in.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-ps-tumblr3.png"><img class="aligncenter size-medium wp-image-10060" title="And just when you thought they had enough..." src="http://www.gfi.com/blog/wp-content/uploads/2012/12/fb-ps-tumblr3-300x158.png" alt="" width="300" height="158" /></a><em>click to enlarge</em></p>
<p>Filling in surveys, of course, generate affiliate commissions for the scammers.</p>
<p>Not long ago, our friends at Webroot <a href="http://blog.webroot.com/2012/12/19/fake-change-facebook-color-theme-events-lead-to-rogue-chrome-extensions/">documented</a> the rise of the bogus &#8220;<strong>Change Facebook Theme Color</strong>&#8221; scam, and its method is similar to Profile Spy&#8217;s. Could the two be somehow related?</p>
<p>GFI Labs has already notified Google regarding the rogue Chrome extension, which we detect as <strong>Adware.FSpy</strong>. [UPDATE: Google has now taken down the Profile Spy page on the Chrome Web Store.]</p>
<p>Watch that mouse pointer, dear Reader, and careful where you direct and click it.</p>
<p>Jovi Umawing (Thanks to Adam for additional screenshots and analysis)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/profile-spy-resurrects-on-eve-of-mayan-apocalypse/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>LinkedIn Spam: The Repeat</title>
		<link>http://www.gfi.com/blog/linkedin-spam-the-repeat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=linkedin-spam-the-repeat</link>
		<comments>http://www.gfi.com/blog/linkedin-spam-the-repeat/#comments</comments>
		<pubDate>Wed, 19 Dec 2012 14:10:21 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10045</guid>
		<description><![CDATA[Another slew of spam claiming to originate from LinkedIn has hit the wild Internet in less than 24 hours, according to the real time recording and tracking of email threats by our researchers in the AV Labs. The malicious spam, this time, poses &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol.png"><img class="alignleft size-thumbnail wp-image-10046" style="border: 0px; margin: 10px;" title="Mohawked &quot;at&quot; symbol" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol-150x150.png" alt="" width="150" height="150" /></a>Another slew of <a href="http://www.gfi.com/products/gfi-mailessentials/pricing#overview"><strong>spam</strong></a> claiming to originate from <strong>LinkedIn </strong>has<strong> </strong>hit the wild Internet in less than 24 hours, <a href="http://gfisoftware.tumblr.com/post/38238165249/malicious-linkedin-invitation-spam-returns">according</a> to the <a href="http://gfisoftware.tumblr.com/">real time recording and tracking of email threats</a> by our researchers in the AV Labs.</p>
<p>The malicious spam, this time, poses a question then gives a less-than-stellar answer to it, something criminals are counting on that recipients may simply accept and believe. Well, we better not take their word for it.</p>
<p>Here&#8217;s what the email looks like:</p>
<p style="text-align: center;"><em><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm.png"><img class="aligncenter size-medium wp-image-10050" title="Screenshot of LinkedIn spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm-300x169.png" alt="" width="300" height="169" /></a>click to enlarge</em></p>
<blockquote><p><strong>From:</strong> {bogus email address}<br />
<strong>To:</strong> {random}<br />
<strong>Subject:</strong> Join my network on LinkedIn<br />
<strong>Message body:</strong><br />
{redacted} has indicated you are a Friend</p>
<p>I’d like to add you to my professional network on LinkedIn.</p>
<p>[Allow button] View invitation from {redacted}</p>
<p>WHY MIGHT CONNECTING WITH {redacted} BE A GOOD IDEA?</p>
<p>{redacted} connections could be useful to you</p>
<p>After accepting {redacted} invitation, check {redacted} connections to see who else you may know and who you might want an introduction to. Building these connections can create opportunities in the future.</p></blockquote>
<p>Clicking the <em>Allow</em> button or the link on the message body directs users to several Web pages of compromised sites, which all look like this<span style="line-height: 24px; font-size: medium;">:</span></p>
<p style="text-align: center;"><span style="font-size: medium;"><span style="line-height: 24px;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm.png"><img class="aligncenter size-medium wp-image-10048" title="Hello, Stranger--NOT!" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm-300x105.png" alt="" width="300" height="105" /></a></span></span><em><span style="line-height: 24px; font-size: medium;">click to enlarge</span></em></p>
<p>This page laced with the <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=27&amp;y=14"><strong>Blackhole Exploit Kit</strong></a> code then auto-redirects users to a Russian website where the <a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0"><strong>Cridex</strong></a> info-stealer payload can be downloaded.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm.png"><img class="aligncenter size-medium wp-image-10049" title="Would you like a Java with that?" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm-300x131.png" alt="" width="300" height="131" /></a><em>click to enlarge</em></p>
<p>Like we&#8217;ve said before, when in doubt, users should simply visit their LinkedIn pages and check their profile mailbox for invites.</p>
<p>Related posts:</p>
<ul>
<li><a href="http://www.gfi.com/blog/fake-linkedin-mails-lead-to-cridex/">Fake LinkedIn Mails Lead To Cridex</a></li>
<li><a href="http://www.gfi.com/blog/new-phishing-campaign-targets-linkedin-users-with-fake-reminders/">New Phishing Campaign Targets LinkedIn Users with Fake Reminders</a></li>
<li><a href="http://www.gfi.com/blog/zeus-linkedin-mails-still-out-for-delivery/">Zeus LinkedIn mails still out for delivery</a></li>
</ul>
<p>Jovi Umawing (Thanks to the GFI Labs team)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/linkedin-spam-the-repeat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-6</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 17:18:59 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[adobe cs]]></category>
		<category><![CDATA[adobe cs4]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[citi credit card]]></category>
		<category><![CDATA[CitiBank]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[mailbox upgrade]]></category>
		<category><![CDATA[microsoft outlook]]></category>
		<category><![CDATA[outlook express]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[ZBOT]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10038</guid>
		<description><![CDATA[Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14. &#8220;Mailbox Upgrade&#8221; Email is a Phish. If you&#8217;re using Microsoft Outlook or Outlook Express, I&#8217;m sure you&#8217;re familiar &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2.png"><img class="alignleft size-thumbnail wp-image-10039" style="border: 0px; margin: 10px;" title="Email Threats for the Week (December 10 - 14)" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2-150x150.png" alt="" width="150" height="150" /></a> Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14.</p>
<ul>
<li><strong>&#8220;Mailbox Upgrade&#8221; Email is a Phish. </strong>If you&#8217;re using <strong>Microsoft Outlook</strong> or <strong>Outlook Express</strong>, I&#8217;m sure you&#8217;re familiar with this kind of email landing in our inboxes, especially if IT has set a limit of how much your inbox can carry.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm.png"><img class="aligncenter size-medium wp-image-10042" title="Phishing spam supposedly sent by one &quot;Margaret Colleluori&quot;" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm-300x132.png" alt="" width="300" height="132" /></a><em>click to enlarge</em></p>
<p>First off, let me point out two things: one, 20GB of email space is too huge to be believable, and IT normally sets the limit of 2GB; two, IT does not tell their email users to validate anything. What they normally advise is to delete emails or move them to another location to free up space. Users who click the link on the mail is led to a phishing page. Reference <a href="http://gfisoftware.tumblr.com/post/37643320589/e-mail-credentials-phish">here</a>.</li>
<li><strong>Unsolicited &#8220;Adobe CS4 License&#8221; Leads to Malware.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm.png"><img class="aligncenter size-medium wp-image-10043" title="Spam of fake Adobe CS4 license" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm-300x161.png" alt="" width="300" height="161" /></a><em>click to enlarge</em></p>
<p>I wish there won&#8217;t be takers for any outdated Adobe CS4 license any time soon, much less a bogus one.  This leads to a <strong><a href="http://www.gfi.com/blog/?s=blackhole&amp;x=0&amp;y=0">Blackhole</a>-<a href="http://www.gfi.com/blog/?s=cridex&amp;x=16&amp;y=8">Cridex</a></strong> system infection. Details <a href="http://gfisoftware.tumblr.com/post/37791588782/adobe-indesign-cs4-license-spam-returns">here</a>.</li>
<li><strong>Spammers Target Citibank Clients.</strong> Citibank credit card users are recently targeted by this spam circulating in the wild, claiming to be their <strong>Citi Credit Card</strong> statement. Users who click any of the links, unfortunately, may suddenly find their systems infected with the <strong><a href="http://www.gfi.com/blog/?s=zeus&amp;x=0&amp;y=0">Zbot/ZeuS</a></strong> banking Trojan. More <a href="http://gfisoftware.tumblr.com/post/37830503278/malicious-citibank-credit-card-statement-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm.png"><img class="aligncenter size-medium wp-image-10044" title="Bogus Citi Credit Card spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm-300x220.png" alt="" width="300" height="220" /></a><em>click to enlarge</em></p>
</li>
</ul>
<p>If you come across any of these spam emails, it&#8217;s best to simply delete them from your inbox.</p>
<p>Stay safe!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>FTC: Data About Kids Still Being Shared Without Parents Knowing</title>
		<link>http://www.gfi.com/blog/ftc-data-about-kids-still-being-shared-without-parents-knowing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ftc-data-about-kids-still-being-shared-without-parents-knowing</link>
		<comments>http://www.gfi.com/blog/ftc-data-about-kids-still-being-shared-without-parents-knowing/#comments</comments>
		<pubDate>Tue, 11 Dec 2012 20:38:10 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[apple apps]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[federal trade commission]]></category>
		<category><![CDATA[FTC]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[kids apps]]></category>
		<category><![CDATA[mobile apps]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10007</guid>
		<description><![CDATA[The Federal Trade Commission (FTC) has recently released a survey report entitled Mobile Apps for Kids: Disclosures Still Not Making the Grade (PDF), which aimed to study &#8220;the privacy disclosures and practices of apps offered for children in the Google Play &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/children-shot.jpg"><img class="alignleft size-thumbnail wp-image-10008" style="border: 0px; margin: 10px;" title="Say &quot;Cheese!&quot;" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/children-shot-150x150.jpg" alt="" width="150" height="150" /></a>The <strong>Federal Trade Commission (FTC)</strong> has recently released a survey report entitled <em><a href="http://ftc.gov/os/2012/12/121210mobilekidsappreport.pdf"><strong>Mobile Apps for Kids: Disclosures Still Not Making the Grade</strong></a></em> (PDF), which aimed to study &#8220;the privacy disclosures and practices of apps offered for children in the <a href="http://www.gfi.com/blog/?s=google+play&amp;x=30&amp;y=20"><strong>Google Play</strong></a> and <a href="http://www.gfi.com/blog/?s=apple+app&amp;x=22&amp;y=4"><strong>Apple App</strong></a> stores&#8221;.</p>
<p>According to this study, they have found little progress in the way companies that develop apps for children handle data gathering and notifications. It&#8217;s important to note that the FTC has already seen these two problems and published a <a href="http://www.ftc.gov/os/2012/02/120216mobile_apps_kids.pdf">report last February 2012</a> (PDF) to reflect all their findings in 2011.</p>
<p>We fear that as the app industry grows bigger and more threats are targeting mobile users, (1) children would more likely be affected if not targeted by the threat itself and (2) this issue on app disclosure will take less priority over other issues.</p>
<p>Some of the data siphoned by apps for kids are accurate geolocation, contact list, the smartphone&#8217;s number, call logs, other personally identifiable information (PII) and other stored data. Since most apps share information with third-parties such as ad networks, it&#8217;s possible for these third-party companies to piece together data in order to create accurate profiles of children based on how they interact with the apps they&#8217;re using.</p>
<p>&#8220;Companies that operate in the mobile marketplace provide great benefits, but they must step up to the plate and provide easily accessible, basic information, so that parents can make informed decisions about the apps their kids use.&#8221; says Jon Leibowitz, chairman of the FTC. &#8220;Right now, it is almost impossible to figure out which apps collect data and what they do with it. The kids app ecosystem needs to wake up, and we want to work collaboratively with industry to help ensure parents have the information they need.&#8221;</p>
<p>You can read more about the full report <a href="http://ftc.gov/opa/2012/12/kidsapp.shtm">here</a>.</p>
<p>Jovi Umawing</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/ftc-data-about-kids-still-being-shared-without-parents-knowing/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 04:51:38 by W3 Total Cache --