<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Search Results  &#187;  zeus</title>
	<atom:link href="http://www.gfi.com/blog/search/zeus/feed/rss2/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 17:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Fake Adobe Flash Updates Resurface on the Web</title>
		<link>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-adobe-flash-updates-resurfaces-in-the-web</link>
		<comments>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/#comments</comments>
		<pubDate>Thu, 24 Jan 2013 15:32:29 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[BBB]]></category>
		<category><![CDATA[Better Business Bureau]]></category>
		<category><![CDATA[eFax]]></category>
		<category><![CDATA[efax corporate]]></category>
		<category><![CDATA[fake adobe flash player]]></category>
		<category><![CDATA[fake google chrome]]></category>
		<category><![CDATA[pony downloader]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10198</guid>
		<description><![CDATA[Following the return of fake Google Chrome browser updates almost two weeks ago, online criminals are now banking on fake Adobe Flash Player updates to lure the unwary user into downloading malware onto their system. Matthew and Robert, two of our &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/fake-flash-logo-avatar.png"><img class="alignleft size-thumbnail wp-image-10199" style="border: 0px; margin: 10px;" title="Fake Adobe Flash Player Update" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/fake-flash-logo-avatar-150x150.png" alt="" width="150" height="150" /></a>Following the return of <a href="http://www.gfi.com/blog/fake-google-chrome-updates-return/">fake <strong>Google Chrome</strong> browser updates</a> almost two weeks ago, online criminals are now banking on fake <strong>Adobe Flash Player</strong> updates to lure the unwary user into downloading malware onto their system.</p>
<p>Matthew and Robert, two of our researchers in the AV Labs, discovered this upon digging deeper into spam emails claiming to be from the <a href="http://gfisoftware.tumblr.com/post/41205966325/ny-better-business-bureau-attachment-spam"><strong>Better Business Bureau (BBB)</strong></a> and <strong><a href="http://gfisoftware.tumblr.com/post/41285616866/efax-corporate-message-spam">eFax Corporate</a>. </strong>Complete email details of these spam have documented in our <a href="http://gfisoftware.tumblr.com/">GFI Software Tumblr site</a>.</p>
<p>The BBB email contains an attachment that is found to be a <a href="http://www.vipreantivirus.com/"><strong>Pony downloader</strong></a> that, once opened, downloads a variant of the <a href="http://www.gfi.com/blog/?s=zeus&amp;x=17&amp;y=19"><strong>ZeuS</strong></a> banking Trojan onto the affected user&#8217;s system. The said downloader also steals various passwords related to FTP sites.</p>
<p>One of the URLs that the Pony downloader calls back to is a domain served on the IP address <em>74(dot)91(dot)117(dot)49</em>, which is found to host other malicious files like the <a href="http://threatpost.com/en_us/blogs/black-hole-exploit-kit-20-released-091212"><strong>Blackhole Exploit Kit 2.0</strong></a>, <a href="http://blogs.technet.com/b/mmpc/archive/2012/09/10/msrt-september-12-medfos-hijacking-your-daily-search.aspx"><strong>Medfos</strong></a> (a Trojan downloader that hijacks search results), the <strong>Simda rootkit</strong>, the <a href="http://malwareprotectioncenter.com/2011/07/16/personal-shield-pro-rogue-of-the-winweb-security-family/"><strong>WinWeb Security</strong></a> <a href="http://malwareprotectioncenter.com/"><strong>rogue AV</strong></a>, and ZeuS.</p>
<p>The following compromised domains are found to be hosted on the above IP:</p>
<ul>
<li>13(dot)carnovirious(dot)net</li>
<li>13(dot)blumotorada(dot)net</li>
<li>13(dot)lomerdaster(dot)net</li>
<li>13(dot)jonemnominik(dot)net</li>
<li>13(dot)zabakarvester(dot)net<span style="text-align: center;"> </span></li>
</ul>
<p style="text-align: left;">Below is a sample screenshot of one of the compromised sites hosting the fake Google Chrome update:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-chrome.png"><img class="aligncenter size-medium wp-image-10201" title="Screenshot of fake Google Chrome update page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-chrome-300x215.png" alt="" width="300" height="215" /></a><em>click to enlarge</em></p>
<p>And here is a sample screenshot of the malicious IP hosting a fake Adobe Flash Player update:</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-flash.png"><img class="aligncenter size-medium wp-image-10202" title="Screenshot of the fake Adobe Flash Update page" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/screen-fake-flash-300x167.png" alt="" width="300" height="167" /></a><em>click to enlarge</em></p>
<p>When it comes to updating software installed in your systems, it is still best to visit their official websites. Free update checkers, such as the FileHippo program, can also assist users in managing software that needs updating in real-time.</p>
<p>Related posts:</p>
<ul>
<li><a href="http://www.gfi.com/blog/adp-spam-campaigns-are-in-the-wild/">ADP Spam Campaigns are in the Wild</a></li>
<li><a href="http://www.gfi.com/blog/this-spam-gives-recipients-a-second-chance/">This Spam Gives Recipients a Second Chance</a></li>
<li><a href="http://www.gfi.com/blog/news-of-brazils-former-presidents-death-leads-to-malware/">News of Brazil’s Former President’s Death Leads to Malware</a></li>
<li><a href="http://www.gfi.com/blog/fake-flash-player-fun/">Fake Flash Player Fun</a></li>
</ul>
<p>Jovi Umawing (Thanks to Matthew and Robert)</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Fake Google Chrome Updates Return</title>
		<link>http://www.gfi.com/blog/fake-google-chrome-updates-return/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fake-google-chrome-updates-return</link>
		<comments>http://www.gfi.com/blog/fake-google-chrome-updates-return/#comments</comments>
		<pubDate>Fri, 11 Jan 2013 09:10:38 +0000</pubDate>
		<dc:creator>Chris Boyd</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[chrome update]]></category>
		<category><![CDATA[fake]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[stealer]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10118</guid>
		<description><![CDATA[&#8220;Oh hey, a new Chrome update! I&#8217;d better hurry up and download the file from this random website with no apparent connection to anything remotely related to my web browser&#8221;. There are things better left unsaid, and the above is &#8230;]]></description>
				<content:encoded><![CDATA[<p>&#8220;Oh hey, a new Chrome update! I&#8217;d better hurry up and download the file from this random website with no apparent connection to anything remotely related to my web browser&#8221;.</p>
<p>There are things better left unsaid, and the above is probably floating around near the top somewhere. A scam from a few months ago &#8211; <a href="http://forums.anvisoft.com/viewtopic-46-1966-0.html">fake Chrome update websites leading to Malware</a> &#8211; has returned and is <a href="http://www.mywot.com/en/scorecard/11.lamarianella.info/comment-58095257?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+WOTWebOfTrustScorecard-Comments+(WOT+Web+of+Trust+scorecard+-+Comments)#comment-58095257">currently turning heads</a>.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake1.jpg"><img class="aligncenter size-medium wp-image-10120" style="border: 0px; margin: 10px;" title="Amazingly enough, this is not a real Chrome update" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake1-300x229.jpg" alt="" width="300" height="229" /></a></p>
<p>Click to Enlarge</p>
<p>The design of the website is identical to the initial rollout, urging the end-user to &#8220;Update Google Chrome: To make sure that you&#8217;re protected by the latest security updates&#8221;.</p>
<p>If you attempt to download the file while using Chrome, the following prompt appears quicker than Christopher Nolan can make a movie about it:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake2.jpg"><img class="aligncenter size-full wp-image-10119" style="border: 0px; margin: 10px;" title="You'll just have to imagine the Inception horns." src="http://www.gfi.com/blog/wp-content/uploads/2013/01/googchromefake2.jpg" alt="" width="264" height="57" /></a></p>
<p>GOOD ADVICE, CHROME.</p>
<p>The file itself has been around for a while, being seen on around 14 or so websites since around October and is listed at <a href="http://malwr.com/analysis/ab5ec8f2acd42b635a79503701eb5d41/">Malwr.com</a> which mentions attempts to access Firefox&#8217;s Password Manager local database &#8211; meanwhile, it&#8217;s listed on the comments section of VirusTotal as being <a href="https://www.virustotal.com/file/19d087ddaadf8fc3d5b8a422dc303e6ea6cdac2a55b4b14e9f28aec9c8902439/analysis/">capable of stealing banking credentials</a>. You&#8217;ll notice they mention Zeus &#8211; indeed, one of the DNS requests made is to a site by the Malware is related to <a href="http://www.mywot.com/en/scorecard/q.e-tecinnovation.co.uk/comment-51266769#comment-51266769">ZBot / Blackhole exploit kit attacks</a>. In fact, it seems to want to swipe information of a very similar nature to a ZBot infection from August of 2012 detailed on the <a href="http://blog.shadowserver.org/2012/08/14/beware-the-trolls-secure-your-trackers/">ShadowServer Blog</a> (scroll down to the &#8220;data it tries to collect and steal&#8221;).</p>
<p>Put simply, you don&#8217;t want this anywhere near your computer and users of Chrome curious about updates should simply read the information on the <a href="http://support.google.com/chrome/bin/answer.py?hl=en&amp;answer=95414">relevant Google Chrome support page</a>. <a href="http://www.vipreantivirus.com/">VIPRE Antivirus</a> detects this threat as Trojan.Win32.Cleaman.aj (v).</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/fake-google-chrome-updates-return/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>LinkedIn Spam: The Repeat</title>
		<link>http://www.gfi.com/blog/linkedin-spam-the-repeat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=linkedin-spam-the-repeat</link>
		<comments>http://www.gfi.com/blog/linkedin-spam-the-repeat/#comments</comments>
		<pubDate>Wed, 19 Dec 2012 14:10:21 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[linkedin]]></category>
		<category><![CDATA[spam]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10045</guid>
		<description><![CDATA[Another slew of spam claiming to originate from LinkedIn has hit the wild Internet in less than 24 hours, according to the real time recording and tracking of email threats by our researchers in the AV Labs. The malicious spam, this time, poses &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol.png"><img class="alignleft size-thumbnail wp-image-10046" style="border: 0px; margin: 10px;" title="Mohawked &quot;at&quot; symbol" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/mohawked-at-symbol-150x150.png" alt="" width="150" height="150" /></a>Another slew of <a href="http://www.gfi.com/products/gfi-mailessentials/pricing#overview"><strong>spam</strong></a> claiming to originate from <strong>LinkedIn </strong>has<strong> </strong>hit the wild Internet in less than 24 hours, <a href="http://gfisoftware.tumblr.com/post/38238165249/malicious-linkedin-invitation-spam-returns">according</a> to the <a href="http://gfisoftware.tumblr.com/">real time recording and tracking of email threats</a> by our researchers in the AV Labs.</p>
<p>The malicious spam, this time, poses a question then gives a less-than-stellar answer to it, something criminals are counting on that recipients may simply accept and believe. Well, we better not take their word for it.</p>
<p>Here&#8217;s what the email looks like:</p>
<p style="text-align: center;"><em><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm.png"><img class="aligncenter size-medium wp-image-10050" title="Screenshot of LinkedIn spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/LinkedIn_1218-wm-300x169.png" alt="" width="300" height="169" /></a>click to enlarge</em></p>
<blockquote><p><strong>From:</strong> {bogus email address}<br />
<strong>To:</strong> {random}<br />
<strong>Subject:</strong> Join my network on LinkedIn<br />
<strong>Message body:</strong><br />
{redacted} has indicated you are a Friend</p>
<p>I’d like to add you to my professional network on LinkedIn.</p>
<p>[Allow button] View invitation from {redacted}</p>
<p>WHY MIGHT CONNECTING WITH {redacted} BE A GOOD IDEA?</p>
<p>{redacted} connections could be useful to you</p>
<p>After accepting {redacted} invitation, check {redacted} connections to see who else you may know and who you might want an introduction to. Building these connections can create opportunities in the future.</p></blockquote>
<p>Clicking the <em>Allow</em> button or the link on the message body directs users to several Web pages of compromised sites, which all look like this<span style="line-height: 24px; font-size: medium;">:</span></p>
<p style="text-align: center;"><span style="font-size: medium;"><span style="line-height: 24px;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm.png"><img class="aligncenter size-medium wp-image-10048" title="Hello, Stranger--NOT!" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-01-wm-300x105.png" alt="" width="300" height="105" /></a></span></span><em><span style="line-height: 24px; font-size: medium;">click to enlarge</span></em></p>
<p>This page laced with the <a href="http://www.gfi.com/blog/?s=blackhole&amp;x=27&amp;y=14"><strong>Blackhole Exploit Kit</strong></a> code then auto-redirects users to a Russian website where the <a href="http://www.gfi.com/blog/?s=cridex&amp;x=0&amp;y=0"><strong>Cridex</strong></a> info-stealer payload can be downloaded.</p>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm.png"><img class="aligncenter size-medium wp-image-10049" title="Would you like a Java with that?" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/linkedin-02-wm-300x131.png" alt="" width="300" height="131" /></a><em>click to enlarge</em></p>
<p>Like we&#8217;ve said before, when in doubt, users should simply visit their LinkedIn pages and check their profile mailbox for invites.</p>
<p>Related posts:</p>
<ul>
<li><a href="http://www.gfi.com/blog/fake-linkedin-mails-lead-to-cridex/">Fake LinkedIn Mails Lead To Cridex</a></li>
<li><a href="http://www.gfi.com/blog/new-phishing-campaign-targets-linkedin-users-with-fake-reminders/">New Phishing Campaign Targets LinkedIn Users with Fake Reminders</a></li>
<li><a href="http://www.gfi.com/blog/zeus-linkedin-mails-still-out-for-delivery/">Zeus LinkedIn mails still out for delivery</a></li>
</ul>
<p>Jovi Umawing (Thanks to the GFI Labs team)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/linkedin-spam-the-repeat/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-6</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/#comments</comments>
		<pubDate>Tue, 18 Dec 2012 17:18:59 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[adobe cs]]></category>
		<category><![CDATA[adobe cs4]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[citi credit card]]></category>
		<category><![CDATA[CitiBank]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[mailbox upgrade]]></category>
		<category><![CDATA[microsoft outlook]]></category>
		<category><![CDATA[outlook express]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[ZBOT]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10038</guid>
		<description><![CDATA[Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14. &#8220;Mailbox Upgrade&#8221; Email is a Phish. If you&#8217;re using Microsoft Outlook or Outlook Express, I&#8217;m sure you&#8217;re familiar &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2.png"><img class="alignleft size-thumbnail wp-image-10039" style="border: 0px; margin: 10px;" title="Email Threats for the Week (December 10 - 14)" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/email-threats2-150x150.png" alt="" width="150" height="150" /></a> Another week, another roundup of noteworthy email threats for the week. For this release, we&#8217;re covering the dates of December 10 to 14.</p>
<ul>
<li><strong>&#8220;Mailbox Upgrade&#8221; Email is a Phish. </strong>If you&#8217;re using <strong>Microsoft Outlook</strong> or <strong>Outlook Express</strong>, I&#8217;m sure you&#8217;re familiar with this kind of email landing in our inboxes, especially if IT has set a limit of how much your inbox can carry.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm.png"><img class="aligncenter size-medium wp-image-10042" title="Phishing spam supposedly sent by one &quot;Margaret Colleluori&quot;" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Phish_1210-wm-300x132.png" alt="" width="300" height="132" /></a><em>click to enlarge</em></p>
<p>First off, let me point out two things: one, 20GB of email space is too huge to be believable, and IT normally sets the limit of 2GB; two, IT does not tell their email users to validate anything. What they normally advise is to delete emails or move them to another location to free up space. Users who click the link on the mail is led to a phishing page. Reference <a href="http://gfisoftware.tumblr.com/post/37643320589/e-mail-credentials-phish">here</a>.</li>
<li><strong>Unsolicited &#8220;Adobe CS4 License&#8221; Leads to Malware.</strong>
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm.png"><img class="aligncenter size-medium wp-image-10043" title="Spam of fake Adobe CS4 license" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/AdobeCS4_1212-wm-300x161.png" alt="" width="300" height="161" /></a><em>click to enlarge</em></p>
<p>I wish there won&#8217;t be takers for any outdated Adobe CS4 license any time soon, much less a bogus one.  This leads to a <strong><a href="http://www.gfi.com/blog/?s=blackhole&amp;x=0&amp;y=0">Blackhole</a>-<a href="http://www.gfi.com/blog/?s=cridex&amp;x=16&amp;y=8">Cridex</a></strong> system infection. Details <a href="http://gfisoftware.tumblr.com/post/37791588782/adobe-indesign-cs4-license-spam-returns">here</a>.</li>
<li><strong>Spammers Target Citibank Clients.</strong> Citibank credit card users are recently targeted by this spam circulating in the wild, claiming to be their <strong>Citi Credit Card</strong> statement. Users who click any of the links, unfortunately, may suddenly find their systems infected with the <strong><a href="http://www.gfi.com/blog/?s=zeus&amp;x=0&amp;y=0">Zbot/ZeuS</a></strong> banking Trojan. More <a href="http://gfisoftware.tumblr.com/post/37830503278/malicious-citibank-credit-card-statement-spam">here</a>.
<p style="text-align: center;"><a class="lightbox" href="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm.png"><img class="aligncenter size-medium wp-image-10044" title="Bogus Citi Credit Card spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/12/Citi_1213-wm-300x220.png" alt="" width="300" height="220" /></a><em>click to enlarge</em></p>
</li>
</ul>
<p>If you come across any of these spam emails, it&#8217;s best to simply delete them from your inbox.</p>
<p>Stay safe!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-6/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GFI Labs Email Roundup for the Week</title>
		<link>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=gfi-labs-email-roundup-for-the-week-2</link>
		<comments>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-2/#comments</comments>
		<pubDate>Fri, 09 Nov 2012 08:28:59 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[cridex]]></category>
		<category><![CDATA[DUA]]></category>
		<category><![CDATA[election]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[google compare]]></category>
		<category><![CDATA[US election]]></category>
		<category><![CDATA[USAA]]></category>
		<category><![CDATA[ZBOT]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9806</guid>
		<description><![CDATA[We&#8217;re starting off this roundup with a quick recap of what has transpired this week. First off, the US Elections last November 6: As expected, election-related threats have continued to make rounds that day. We won&#8217;t be surprised if we &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/11/email-roundup-avatar.jpg"><img class="alignleft size-thumbnail wp-image-9807" style="border: 0px; margin: 10px;" title="Email Threats Roundup" src="http://www.gfi.com/blog/wp-content/uploads/2012/11/email-roundup-avatar-150x150.jpg" alt="" width="150" height="150" /></a></p>
<p>We&#8217;re starting off this roundup with a quick recap of what has transpired this week.</p>
<p>First off, the US <a href="http://www.gfi.com/blog/?s=election">Elections</a> last November 6: As expected, <a href="http://www.gfi.com/blog/of-elections-and-shenanigans/">election-related threats</a> have continued to make rounds that day. We won&#8217;t be surprised if we continue to see some of them remain in the wild days after winners have been declared, so let&#8217;s keep an eye out for that.</p>
<p>This week in the security industry, we have reports of hits and misses, with <a href="http://www.theregister.co.uk/2012/11/08/google_compare_identity_theft/">a security hole found in <strong>Google Compare</strong></a> being the latest on the list. <em>Le Reg</em> has the exclusive story on that.</p>
<p>Brian Krebs of <em>Krebs on Security</em> has reported on a <a href="http://krebsonsecurity.com/2012/11/experts-warn-of-zero-day-exploit-for-adobe-reader/">zero-day exploit for the latest Adobe Reader being sold for $50,000 in the cybercriminal underground</a>.</p>
<p>Lastly, our friends at <a href="http://www.f-secure.com/weblog/archives/00002450.html">F-Secure have released a Q3 2012 report</a> on the ever increasing threats targeting Android smartphone users despite Google&#8217;s effort of improving its current security policies.</p>
<p>In the realm of email threats, our researchers in the AV Labs have found some <a href="http://www.gfi.com/blog/?s=spam"><strong>spam</strong></a> and <a href="http://www.gfi.com/blog/?s=phishing"><strong>phishing</strong></a> mail samples that we have highlighted below:</p>
<ol>
<li><strong>Malicious New York Division of Unemployment Assistance (DUA) clam spam.</strong> The criminals urge the recipient to provide some necessary information for the processing of the said claim. The link on the email body, however, leads to the download of a <strong><a href="http://www.gfi.com/blog/?s=zeus">ZeuS</a>/<a href="http://www.gfi.com/blog/?s=zbot">Zbot</a></strong> variant, a common information stealer. Details <a href="http://gfisoftware.tumblr.com/post/35277968955/malicious-new-york-unemployment-spam">here</a>.</li>
<li><strong>Malicious airline ticket spam.</strong> Recipients of this fake email supposedly from <strong>Delta Airlines</strong> may find themselves opening a malicious attachment that poses as a plane ticket. Watch out! It&#8217;s a <a href="http://www.gfi.com/blog/?s=rogue+av"><strong>rogue AV</strong></a> file. Details <a href="http://gfisoftware.tumblr.com/post/35277107977/malicious-delta-airlines-attachment-spam">here</a>.</li>
<li><strong>Malicious <a href="http://www.gfi.com/blog/?s=itunes">iTunes</a> receipt spam.</strong> Are you using iTunes? Please be wary, dear Reader, that a new receipt spam making rounds is targeting users. All links on the message body lead to a <strong><a href="http://www.gfi.com/blog/?s=blackhole">Blackhole</a> <a href="http://www.gfi.com/blog/?s=exploit">exploit</a></strong> kit. Details <a href="http://gfisoftware.tumblr.com/post/35272520279/malicious-itunes-receipt-spam">here</a>.</li>
<li><strong>Malicious spam claiming to be failed deliveries.</strong> We have received a handful of those this week, from wire transfers to postal packages. A sample of the former leads users to a <strong>Blackhole/<a href="http://www.gfi.com/blog/?s=cridex">Cridex</a></strong> infection and a sample of the latter to a rogue AV infection. Details <a href="http://gfisoftware.tumblr.com/post/35058215786/malicious-wire-transfer-spam-continued">here</a> and <a href="http://gfisoftware.tumblr.com/post/35212139977/malicious-us-postal-service-spam-continues">here</a>.</li>
</ol>
<p>In case you missed it, we have also written about a <a href="http://www.gfi.com/blog/phishers-take-aim-at-usaa/"><strong>USAA</strong> phishing spam</a> that generally targets military personnel—both active and retired—and their families.</p>
<p>Not every email that ends up in your inbox is safe. It is, therefore, important that we continue to exercise due diligence when handling suspicious emails.</p>
<p>&#8216;Till the next roundup!</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/gfi-labs-email-roundup-for-the-week-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>This Spam Gives Recipients a Second Chance</title>
		<link>http://www.gfi.com/blog/this-spam-gives-recipients-a-second-chance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=this-spam-gives-recipients-a-second-chance</link>
		<comments>http://www.gfi.com/blog/this-spam-gives-recipients-a-second-chance/#comments</comments>
		<pubDate>Tue, 16 Oct 2012 12:13:41 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[adobe flash player]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[flash player]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9634</guid>
		<description><![CDATA[This latest find from our researchers in the AV Labs is filed under the &#8220;We Found Another Facebook Spam&#8221; pile. Let it be a warning to you, dear Reader, about this mail that purports to originate from Facebook and bears &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/facebook-icon.jpg"><img class="alignleft size-thumbnail wp-image-9639" style="border: 0px; margin: 10px;" title="Colourful Facebook icon" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/facebook-icon-150x150.jpg" alt="" width="150" height="150" /></a></p>
<p>This latest find from our researchers in the AV Labs is filed under the &#8220;We Found Another <strong>Facebook</strong> <strong>Spam</strong>&#8221; pile.</p>
<p>Let it be a warning to you, dear Reader, about this mail that purports to originate from Facebook and bears the subject &#8220;Verify your account&#8221;. It isn&#8217;t clear what this verification notice is about unless you read the content of its message body, which says:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/FB_1015.png"><img class="aligncenter size-medium wp-image-9646" title="Screenshot of the fake Facebook spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/FB_1015-300x179.png" alt="" width="300" height="179" /></a><em>click to enlarge</em></p>
<blockquote><p>Hi {recipient&#8217;s email address},</p>
<p>You have blocked your Facebook account. You can reactivate your account whenever you wish by logging into Facebook with your former login email address and password. Subsequently you will be able to take advantage of the site as before</p>
<p>Kind regards,<br />
The Facebook Team</p></blockquote>
<p><em>(To help clear up the slight confusion in context, &#8220;blocked&#8221; here may mean that an account has been deactivated, specifically the spam recipient&#8217;s; it has nothing to do with blocking search engine from pulling out and displaying the recipient&#8217;s Facebook profile if someone does a search of their name, as some sites suggest.)</em></p>
<p>This is a seemingly potent social engineering tactic to get panicked (if not half-perplexed, half-curious) recipients clicking away. The tactic may probably be not as effective if the recipient normally thinks twice before reacting to such a message.</p>
<p>Clicking any of the links on the email leads users to various URLs that are clearly unrelated to Facebook in any way. We believe that these sites have been compromised, and sure enough, they all redirect users to <a href="http://www.gfi.com/blog/adp-spam-campaigns-are-in-the-wild/">a very familiar territory</a>:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/fake-adobe-page.png"><img class="aligncenter size-medium wp-image-9643" title="Well, waddaya know? A Fake Adobe Flash Player download page!" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/fake-adobe-page-300x141.png" alt="" width="300" height="141" /></a><em>click to enlarge</em></p>
<p>Yep, it&#8217;s another <strong><a href="http://www.gfi.com/blog/?s=blackhole">Blackhole</a>-<a href="http://www.gfi.com/blog/?s=zeus">Zeus</a></strong>-related threat.</p>
<p>Please ignore and delete this Facebook spam if you have it in your inbox.</p>
<p>For real-time email-related findings by our researchers at the Labs, please visit the <strong>GFI Software Tumblr</strong> page at <a href="http://www.gfisoftware.tumblr.com/">www.gfisoftware.tumblr.com</a>.</p>
<p>Jovi Umawing (Thanks to the GFI Labs team)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/this-spam-gives-recipients-a-second-chance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ADP Spam Campaigns are in the Wild</title>
		<link>http://www.gfi.com/blog/adp-spam-campaigns-are-in-the-wild/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=adp-spam-campaigns-are-in-the-wild</link>
		<comments>http://www.gfi.com/blog/adp-spam-campaigns-are-in-the-wild/#comments</comments>
		<pubDate>Fri, 12 Oct 2012 07:50:21 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[adobe flash player]]></category>
		<category><![CDATA[ADP]]></category>
		<category><![CDATA[Automatic Data Processing]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9613</guid>
		<description><![CDATA[These past few days, our researchers in the AV Labs have been seeing a slew of spam campaigns purporting to have originated from the Automatic Data Processing, Inc., or ADP, a solutions provider to businesses with concerns involving outsourcing and &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/bomb.png"><img class="alignleft size-thumbnail wp-image-9616" style="border: 0px; margin: 10px;" title="Sometimes, we can't tell if the email in your inbox is a ticking bomb waiting to explode." src="http://www.gfi.com/blog/wp-content/uploads/2012/10/bomb-150x150.png" alt="" width="150" height="150" /></a></p>
<p>These past few days, our researchers in the AV Labs have been seeing a slew of <strong>spam</strong> campaigns purporting to have originated from the <a href="http://www.adp.com/"><strong>Automatic Data Processing, Inc.</strong></a>, or <strong>ADP</strong>, a solutions provider to businesses with concerns involving outsourcing and computing services for the auto and heavy equipment industries.</p>
<p>The campaigns, which had been <a href="http://gfisoftware.tumblr.com/">documented in real time</a>, come in a number of varying content and appearance; however, these spam all lead to malware infection. Below are some of the samples we have captured:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/01-spam-sample.png"><img class="aligncenter size-medium wp-image-9617" title="&quot;&quot;ADP Funding Notification&quot; spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/01-spam-sample-300x176.png" alt="" width="300" height="176" /></a><em>click to </em><em>enlarge</em></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/02-spam-sample.png"><img class="aligncenter size-medium wp-image-9618" title="&quot;ADP Generated Message&quot; spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/02-spam-sample-300x215.png" alt="" width="300" height="215" /></a><em>click to enlarge</em></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/03-spam-sample.png"><img class="aligncenter size-medium wp-image-9619" title="&quot;ADP Security Management Update&quot; spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/03-spam-sample-300x253.png" alt="" width="300" height="253" /></a><em>click to enlarge</em></p>
<p>Hyperlinks in the spam actually point to URLs that are inherently malicious or probably compromised, which then direct to IP addresses that host a bogus <strong>Adobe Flash</strong> <strong>Player</strong> page where users can download an equally bogus software.</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/04-fake-adobe.png"><img class="aligncenter size-medium wp-image-9620" title="Fake Adobe Flash download page" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/04-fake-adobe-300x154.png" alt="" width="300" height="154" /></a><em>click to enlarge</em></p>
<p>Similar to the<strong> <a href="http://www.gfi.com/blog/skype-voicemail-spam-leads-to-blackhole-zeus-attacks/">Skype voicemail spam</a></strong> we have documented recently, these ADP spam campaigns are also associated with <a href="http://www.gfi.com/blog/?s=blackhole"><strong>Blackhole</strong></a>-<a href="http://www.gfi.com/blog/?s=zeus"><strong>Zeus</strong></a> infections.</p>
<p>When downloading software, make sure that your source domain/page is legitimate. In this case, it is much safer to type in Adobe&#8217;s URL on your browser address bar, navigate to the <em>Downloads</em> page, and get the Player from there.</p>
<p>For the latest email threats in the wild, go to our <strong>GFI Software Tumblr</strong> page at <a href="http://www.gfisoftware.tumblr.com/">www.gfisoftware.tumblr.com</a> where we post noteworthy, comprehensive, and up-to-date analyses straight from our experts in the AV Labs.</p>
<p>Jovi Umawing (Thanks to the GFI Labs team)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/adp-spam-campaigns-are-in-the-wild/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Skype Voicemail Spam leads to Blackhole / Zeus Attacks</title>
		<link>http://www.gfi.com/blog/skype-voicemail-spam-leads-to-blackhole-zeus-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=skype-voicemail-spam-leads-to-blackhole-zeus-attacks</link>
		<comments>http://www.gfi.com/blog/skype-voicemail-spam-leads-to-blackhole-zeus-attacks/#comments</comments>
		<pubDate>Wed, 10 Oct 2012 04:09:37 +0000</pubDate>
		<dc:creator>Chris Boyd</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[blackhole]]></category>
		<category><![CDATA[skype]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[voicemail]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=9596</guid>
		<description><![CDATA[You&#8217;ve probably seen the infection plaguing users of Skype that we wrote about on Friday (and updated on Monday with details of Ransomware and click fraud), but there are other things out there wanting a slice of the Skype Userbase &#8230;]]></description>
				<content:encoded><![CDATA[<p>You&#8217;ve probably seen the infection plaguing users of Skype that we wrote about on <a href="http://www.gfi.com/blog/infection-spreads-profile-pic-messages-to-skype-users/">Friday</a> (and updated on Monday with details of <a href="http://www.gfi.com/blog/skype-users-targeted-with-ransomware-and-click-fraud/">Ransomware and click fraud</a>), but there are other things out there wanting a slice of the Skype Userbase Pie too. Take this spam mail which claims to be a Skype Voicemail notification, for example:</p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2012/10/skypevoicemailscam.png"><img class="aligncenter size-medium wp-image-9597" style="border: 0px; margin: 10px;" title="Skype Voicemail Spam" src="http://www.gfi.com/blog/wp-content/uploads/2012/10/skypevoicemailscam-300x173.png" alt="" width="300" height="173" /></a></p>
<p>Click to Enlarge</p>
<p>It reads as follows:</p>
<blockquote><p>Hi there,</p>
<p>You have a new voicemail</p>
<p>Sign in to Skype to listen to the message.</p>
<p>If you no longer want to receive email alerts about new voicemails, unsubscribe now.</p>
<p>Talk soon,<br />
The people at Skype</p></blockquote>
<p>It looks pretty authentic, and will send curious clickers to URLs tied up in <a href="http://www.gfi.com/blog/?s=blackhole">Blackhole</a> / <a href="http://www.gfi.com/blog/?s=zeus">Zeus</a> infections.  On a related note, we&#8217;re also seeing Sprint Wireless and fake Facebook friend request spam doing much the same as the above so please be careful when wading through your inbox &#8211; there&#8217;s a fair amount of spam targeting users with exploits right now and it covers a wide range of subjects from payroll notifications and Craigslist adverts to UPS invoices and American Express payment receipts.</p>
<p>Christopher Boyd (Thanks to the GFI Labs for finding this)</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/skype-voicemail-spam-leads-to-blackhole-zeus-attacks/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Phishers Use US-CERT Email Address as Bait</title>
		<link>http://www.gfi.com/blog/phishers-use-us-cert-email-address-as-bait-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishers-use-us-cert-email-address-as-bait-2</link>
		<comments>http://www.gfi.com/blog/phishers-use-us-cert-email-address-as-bait-2/#comments</comments>
		<pubDate>Thu, 12 Jan 2012 02:58:31 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[Homeland Security]]></category>
		<category><![CDATA[Ice-IX]]></category>
		<category><![CDATA[phish]]></category>
		<category><![CDATA[phishers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[United States Computer Emergency Readiness Team]]></category>
		<category><![CDATA[US government]]></category>
		<category><![CDATA[US-CERT]]></category>
		<category><![CDATA[ZBOT]]></category>
		<category><![CDATA[Zeus]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=7859</guid>
		<description><![CDATA[The United States Computer Emergency Readiness Team (simply known as US-CERT) is the latest bait phishers used to get users to install malware on user systems. US-CERT is a highly esteemed and trusted body of security professionals who tackle cybersecurity issues in &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2012/01/220px-US_Department_of_Homeland_Security_Seal.png"><img class="alignright size-full wp-image-7857" style="border-style: initial; border-color: initial; border-image: initial; border-width: 0px; margin: 10px;" title="US Department of Homeland Seal" src="http://www.gfi.com/blog/wp-content/uploads/2012/01/220px-US_Department_of_Homeland_Security_Seal.png" alt="" width="220" height="219" /></a>The <strong><a href="http://en.wikipedia.org/wiki/United_States_Computer_Emergency_Readiness_Team">United States Computer Emergency Readiness Team</a> </strong>(simply known as <a style="font-weight: bold;" href="http://www.us-cert.gov/">US-CERT</a>) is the latest bait phishers used to get users to install malware on user systems.</p>
<p>US-CERT is a highly esteemed and trusted body of security professionals who tackle cybersecurity issues in the United States. They also work with security vendors to address vulnerability issues. With such impressive credentials, it is possible that some private organizations, including federal, state, and local governments, might have fallen prey to this campaign since they appear to be the targets.</p>
<p>From the <a href="http://www.us-cert.gov/current/index.html#phishing_campaign_using_spoofed_us">US-CERT website</a>: <em>&#8220;Reports indicate that SOC@US-CERT.GOV is the primary email address being spoofed but other invalid email addresses are also being used.</em></p>
<p><em>&#8220;The subject of the phishing email is: &#8220;Phishing incident report call number: PH000000XXXXXXX&#8221; with the &#8220;X&#8221; containing an incident report number that varies.</em></p>
<p><em>&#8220;The attached zip filed is titled &#8220;US-CERT Operation Center Report XXXXXXX.zip&#8221;, with &#8220;X&#8221; indicating a random value or string. The zip attachment contains an executable file with the name &#8220;US-CERT Operation CENTER Reports.eml.exe&#8221;, which is a variant of the <strong>Zeus/Zbot</strong> Trojan known as <strong>Ice-IX</strong>.&#8221;</em></p>
<p>The complete report is found <a href="http://www.us-cert.gov/current/index.html#phishing_campaign_using_spoofed_us">here</a>.</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/phishers-use-us-cert-email-address-as-bait-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Facebook Worm in the Wild</title>
		<link>http://www.gfi.com/blog/new-facebook-worm-in-the-wild/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-facebook-worm-in-the-wild</link>
		<comments>http://www.gfi.com/blog/new-facebook-worm-in-the-wild/#comments</comments>
		<pubDate>Tue, 29 Nov 2011 10:26:00 +0000</pubDate>
		<dc:creator>Jovi Umawing</dc:creator>
				<category><![CDATA[GFI Labs]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[virtual environment]]></category>
		<category><![CDATA[VM]]></category>
		<category><![CDATA[worm]]></category>

		<guid isPermaLink="false">http://stagingblog.gfi.com/blog/new-facebook-worm-in-the-wild/</guid>
		<description><![CDATA[Our friends at CSIS, a Danish security company, has spotted a worm spreading within the Facebook platform. In a recent news article penned by Peter Kruse, the worm is said to be &#8220;a classic&#8221; one in terms of how it infects Internet &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://stagingblog.gfi.com/blog/wp-content/uploads/2011/11/fb2-worm.jpg"><img class="alignright size-full wp-image-7673" title="fb2-worm" src="http://stagingblog.gfi.com/blog/wp-content/uploads/2011/11/fb2-worm.jpg" alt="" width="250" height="250" /></a>Our friends at <a href="http://www.csis.dk/en/csis/about/">CSIS</a>, a Danish security company, has spotted a <strong>worm </strong>spreading within the <strong><em>Facebook</em> </strong>platform. In a <a href="http://www.csis.dk/da/csis/news/3387/">recent news article</a> penned by Peter Kruse, the worm is said to be &#8220;a classic&#8221; one in terms of how it infects Internet users: uses stolen credentials to log in to <em>Facebook</em> accounts and then spam contacts. The message is said to contain a link to a file purporting to be an image—Screenshot of the file shows it has a .JPG extension—but it&#8217;s actually a malicious screensaver. Once run, it drops a cocktail of malicious files onto the system, including <strong>ZeuS</strong>, a popular Trojan spyware capable of stealing user information from infected systems.</p>
<p>The worm is also found to have anti-VM capabilities, making it useless to execute and test in a virtual environment, such as <em>Oracle VM VirtualBox</em> and <em>VMWare</em>.</p>
<p>Please keep in mind that securing your information, including your social network credentials, is a must. Never unknowingly click links on messages sent over by online contacts. Make sure that they did send messages to you first before doing something; else, it is best if you simply delete them from your message inbox.</p>
<p>Jovi Umawing</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/new-facebook-worm-in-the-wild/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 17:06:18 by W3 Total Cache --