Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: All

Blog:

http://ddanchev.blogspot.com/2009/11/koobface-botnet-starts-serving-client.html

WEDNESDAY, NOVEMBER 25, 2009
“Koobface Botnet Starts Serving Client-Side Exploits”
Posted by Dancho Danchev

SNIPPET: “UPDATED, Thursday, November 26, 2009: The gang has currently suspended the use of client-side exploits, let’s see if it’s only for the time being or indefinitely.”


11 posted on 11/26/2009 4:11:19 PM PST by Cindy
[ Post Reply | Private Reply | To 10 | View Replies ]


To: All

http://ddanchev.blogspot.com/2009/11/koobface-botnet-starts-serving-client.html

WEDNESDAY, NOVEMBER 25, 2009
“Koobface Botnet Starts Serving Client-Side Exploits”
Posted by Dancho Danchev

SNIPPET: “UPDATED, Saturday, November 28, 2009: Following yesterday’s experiment with bit.ly redirectors, relying on a “visual social engineering element” by adding descriptive domains after the original link — bit.ly/588dmE?YOUTUBE.COM/ea05981d43, which works with any generated bit.ly link, the gang is now spamvertising links using Google News redirection to automatically registered Blogspot accounts, whose CAPTCHA challenge has been solved by the already infected with Koobface victims, a feature that is now mainstream, compared to the gang’s previous use of commercial CAPTCHA solving services, where the price for a thousand solved CAPTCHAs varies between $1 and $2:”


12 posted on 11/29/2009 5:12:52 PM PST by Cindy
[ Post Reply | Private Reply | To 11 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson