Recent Comments

    Blogroll

    Search

    Archive for Scams

    Keylogger from AWS? You bet!

    May 6th, 2019 by

    Hawkeye keylogger using fileless delivery system via Amazon AWS

    Don’t try to respond by phone or email, all you will do is end up with an innocent person or company who have had their details spoofed and picked at random from a long list that the bad guys have previously found. The bad guys choose companies, Government departments and organisations  with subjects that are designed to entice you or alarm you into blindly opening the attachment or clicking the link in the email to see what is happening.  “

    Posted in Identity Theft, Malware, Scams | No Comments »

    Beware of free Windows “Cleaners”

    April 28th, 2019 by

    Fake Windows PC Cleaner Drops AZORult Info-Stealing Trojan

    Yet another reason to avoid so-called “Cleaners” for Windows. First off, I don’t trust things that will “automatically” make changes to my PC without my knowing exactly what they are doing. Yet these programs keep showing up, even advertised on-line as well as on TV. 

    Researchers have discovered a web site pushing a PC cleaner tool for Windows that in reality is just a front for the Azorult password and information stealing Trojan.

    AZORult is a trojan that when installed attempts to steal a user’s browser passwords, FTP client passwords, cryptocurrency wallets, desktop files, and much more.

    Instead of renting distribution methods such as spam, exploit kits, or being dropped by other trojans, the attackers decided to create a fake Windows utility and an accompanying web site to distribute the trojan instead.

    Posted in Identity Theft, Malware, Scams | No Comments »

    DNS Infrastructure Hijacking Campaign

    January 25th, 2019 by

    Alert (AA19-024A) DNS Infrastructure Hijacking Campaign

    “The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolve. This enables the attacker to redirect user traffic to attacker-controlled infrastructure and obtain valid encryption certificates for an organization’s domain names, enabling man-in-the-middle attacks.”

    Posted in Malware, Scams, Security Breeches | No Comments »

    Be careful with “Non-Delivery” notices from Office 365

    December 17th, 2018 by

    Phishing Attack Pretends to be a Office 365 Non-Delivery Email

    “A phishing campaign has been discovered that pretends to be a non-delivery notifications from Office 365 that leads you to a page attempting to steal your login credentails.

    This new campaign was discovered by ISC Handler Xavier Mertens and states that “Microsoft found Several Undelivered Messages”. It then prompts you to click on the “Send Again” link in order to try sending the emails again. “

    Posted in Malware, Phishing, Scams | No Comments »

    Apps can impersonate you on Facebook

    September 4th, 2018 by

    Scam alert: Beware apps that can impersonate you on Facebook

    Posted in Identity Theft, Scams | No Comments »