Nuclear Exploit Pack goes 2.0

Nuclear Exploit Pack goes 2.0

In times when the market leading Black Hole Exploit Kit continues to gain market share, competing products are prone to emerge. What is the competition up to? Has it managed to differentiate itself from the market leading product or is it basically a “me too” exploit kit lacking any significant features worth emphasizing on?

In this post, I’ll profile the recently advertised Nuclear Exploit Pack v.2.0, elaborate on its features, and discuss whether or not it has the potential to outpace the market leader (Black Hole Exploit Kit) in terms of market share.

More details:

(more…)

Cybercriminals spamvertise millions of bogus Facebook notifications, serve malware

Cybercriminals spamvertise millions of bogus Facebook notifications, serve malware

Recently, cybercriminals spamvertised yet another massive email campaign, impersonating the world’s most popular social network – Facebook.

It was similar to a previously profiled spam campaign imitating Facebook. However, in this case the cybercriminals behind it relied on attached malicious archives, compared to including exploits and malware serving links in the email.

More details:

(more…)

Cybercriminals spamvertise millions of British Airways themed e-ticket receipts, serve malware

Cybercriminals spamvertise millions of British Airways themed e-ticket receipts, serve malware

Cybercrimianals are currently mass mailing millions of emails in an attempt to trick British Airways customers into executing the malicious attachment found in the spamvertised emails. Upon execution, the malware opens a backdoor on the infected host, allowing the cybercriminals behind the campaign to gain complete control over the infected host.

More details:

(more…)

Spamvertised ‘BT Business Direct Order’ themed emails lead to malware

Spamvertised ‘BT Business Direct Order’ themed emails lead to malware

Over the past 24 hours, cybercriminals have been spamvertising millions of emails targeting customers of BT’s Business Direct in an attempt to trick its users into executing the malicious attachment found in the emails. Upon executing it, the malware opens a backdoor on the infected host, allowing the cybercriminals behind the campaign to gain complete access to the affected host.

More details:

(more…)

Cybercriminals impersonate Verizon Wireless, serve client-side exploits and malware

Cybercriminals impersonate Verizon Wireless, serve client-side exploits and malware

Verizon Wireless customers, beware!

For over a week now, cybercriminals have been persistently spamvertising millions of emails impersonating the company, in an attempt to trick current and prospective customers into clicking on the client-side exploits and malware serving links found in the malicious email.

Upon clicking on any of the links, users are exposed to the client-side exploits served by the latest version of the Black Hole Exploit Kit.

More details:

(more…)

Bogus Skype ‘Password successfully changed’ notifications lead to malware

Bogus Skype ‘Password successfully changed’ notifications lead to malware

Skype users, beware!

Cybercriminals are currently spamvertising millions of emails impersonating Skype, in an attempt to trick Skype users that their password has been successfully changed, and that in order to view their call history and change their account settings, they would need to execute the malicious attachment found in the emails.

More details:

(more…)

‘Your UPS Invoice is Ready’ themed emails serve malware

‘Your UPS Invoice is Ready’ themed emails serve malware

Over the past 24 hours, cybercriminals launched yet another massive spam campaign, impersonating the United Parcel Service (UPS), in an attempt to trick its current and prospective customers into downloading and executing the malicious attachment found in the email. Upon execution, the malware opens a backdoor on the infected host, allowing the cybercriminals behind the campaign to gain complete control over the victim’s host.

More details:

(more…)

Russian cybercriminals release new DIY DDoS malware loader

Russian cybercriminals release new DIY DDoS malware loader

On a daily basis, new market entrants into the cybercrime ecosystem attempt to monetize their coding skills by releasing and branding new DIY DDoS malware loaders. Largely dominated by “me too” features, these DIY malware loaders are purposely released with prices lower than the prices of competing bots, in an attempt by the cybercriminal behind them to gain market share – a necessary prerequisite for a successful long-term oriented business model.

In this post, I’ll profile a recently released Russian DDoS malware bot.

More details:

(more…)

‘Regarding your Friendster password’ themed emails lead to Black Hole exploit kit

‘Regarding your Friendster password’ themed emails lead to Black Hole exploit kit

Cybercriminals are currently spamvertising millions of emails, impersonating Friendster,  in an attempt to trick its current and prospective users into clicking on a malicious link found in the email.

Upon clicking on the link, users are exposed to the client-side exploits served by the latest version of the Black Hole exploit kit.

More details:

(more…)