JudulPenulisKutipanDiposting
Trochilus RAT discovered by Arbor NetworksDoug Olenick, SC MagazineArbor Networks has identified a new Remote Access Trojan (RAT), dubbed Trochilus, that has proven to be basically invisible to anti-malware software and possibly used for espionage purposes. ....Jumat, 05 Feb 2016
New wave of attacks against Ukrainian power industryRobert Lipovsky, WeLiveSecurityYesterday we discovered a new wave of these attacks, where a number of electricity distribution companies in Ukraine were targeted again following the power outages in December. ...Jumat, 05 Feb 2016
Polycom VVX-Series Business Media Phones Path Traversal Vulnerability (0-Day)Depth Security BlogIn June I spent a little time in the web administrative interface of a Polycom VVX600 IP phone running UC Software Version 5.1.3.1675. As I proxied the traffic through BurpSuite, I immediately noticed something interesting in the requests that the interface uses to display phone background images and ring tones to web users. The requests contained actual file names.Rabu, 03 Feb 2016
Microsoft Windows VBScript Split Function Use-After-Free Information Disclosure VulnerabilityZero Day InitiativeThis vulnerability allows remote attackers to disclose the contents of memory on applications using the VBScript scripting language on vulnerable installations of Microsoft Windows. .....Rabu, 03 Feb 2016
Exploit upgrade for Microsoft Word Intruder crimeware kitGabor Szappanos, Naked Security (Sophos Blog)Microsoft Word Intruder, or MWI for short, is a toolkit for sneaking malware onto your computer using booby-trapped Word files. ...Selasa, 02 Feb 2016
Come to the dark side. Chimera ransomware asks victims to become affiliatesDavid Bisson, Graham Cluley BlogResearchers have observed that the Chimera ransomware offers victims the option of joining its affiliate program upon infection. ...Selasa, 02 Feb 2016
Bitcoin stolen via malware infected pirated copy of Fallout 4Duncan Riley, siliconAngleVarious industry bodies over the years have tried all sorts of scare tactics in relation to piracy, up to and including taking people to court, but what if your pirated item ended up stealing Bitcoin? ...Selasa, 02 Feb 2016
Angler Exploit Kit Spreading Cryptowall 4.0 RansomwareChris Brook, Threat Post (Kaspersky Lab Blog)As expected, it didn’t take long for one of the most popular exploit kits, Angler, to start spreading the latest iteration of Cryptowall ransomware. ...Selasa, 02 Feb 2016
New helpme@freespeechmail.org Ransomware can be Decrypted for Free Lawrence Abrams, Bleeping ComputerA new ransomware has started to become seen on various computer support forums that encrypts your data and then appends the helpme@freespeechmail.org string to the filename ....Selasa, 02 Feb 2016
Threat Spotlight: Cryptowall 4 - The Evolution ContinuesAndrea Allievi and Holger Unterbrink, Talos BlogOver the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valuable for Talos and led the development of better detection methods within the products we support along with the disruption of adversarial operations. ....Selasa, 02 Feb 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: