Keyword: trojan

Brevity: Headers | « Text »
  • CIA Didn’t Trust FBI or NSA – Created Bogus Updates to Steal Data & Spy on Fellow Agencies

    08/25/2017 10:48:09 PM PDT · by Ernest_at_the_Beach · 19 replies
    wccftech.com ^ | 8/25/17 | Rafia Shaikh
    The Central Intelligence Agency apparently didn’t trust its partners in the American intelligence and created a fake software update to steal their data. Part of an internal project called ExpressLane, the bogus update was installed by the CIA Office of Technical Service (OTS) agents purported to be upgrading the biometric collection system.This biometric system was installed at the “liaison services” that included National Security Agency, Department of Homeland Security, and the Federal Bureau of Intelligence. The agency reportedly installed these at partner offices around the world to gain biometric data that was collected by the other agencies. The scathing revelation...
  • Pre-installed Trojan in Cheap Android Devices Steal Data, Intercept Chats

    07/31/2017 3:57:49 AM PDT · by TigerLikesRooster · 16 replies
    Hackread ^ | July 30, 2017
    Pre-installed Trojan in Cheap Android Devices Steal Data, Intercept Chats Android devices are one of the most vulnerable mobile OS (operating systems) due to its open source nature. But what would a user do if their device is delivered to them with a pre-installed malware? Well, Let’s talk about that. IT security researchers at Dr. Web, a Russian cyber security firm has discovered that a number of Android devices including Leagoo M8, Leagoo M5 Plus, Nomu S20 and Nomu S10 have a malicious program built into the firmware. Dubbed Triada by researchers the Trojan is embedded in the Zygote component’s...
  • More on the Truckload of Chocolate Iraqis in Romania

    01/02/2017 8:32:50 PM PST · by MtnClimber · 15 replies
    Gates of Vienna ^ | Baron Bodissey
    Last night we posted a translated article from Romania about 48 Iraqi migrants who were discovered in the back of a tractor trailer that was supposed to be carrying a load of chocolate candies. Below is a video of the truck being emptied at the border control station between Bulgaria and Romania. Watch all the Iraqis exit the truck. When they’re all finally out on the garage floor, you can see there were no chocolates at all in the cargo compartment — nothing but Iraqis. This must have been a fairly sophisticated operation. It presumably included the collusion of the...
  • New Mac Trojan uses the Russian space program as a front

    09/26/2016 11:48:39 PM PDT · by Swordmaker · 5 replies
    MacWorld ^ | September 26, 2016 | By Michael Kan
    The Komplex Trojan can download, execute, and delete files from an infected Mac Security researchers have found a new Mac OS X malware that appears to be targeting the aerospace industry. The Trojan, called Komplex, can download, execute, and delete files from an infected Mac, according to security firm Palo Alto Networks. Interestingly, the Trojan will also save a PDF document to the infected system concerning the Russian space program. The PDF document details planned Russian space projects from 2016 to 2025, but it acts as a decoy, Palo Alto Networks said in Monday blog post. In reality, the Trojan...
  • What You Need to Know About Mac Malware 'Backdoor.MAC.Eleanor'

    07/06/2016 1:42:36 PM PDT · by Swordmaker · 8 replies
    MacRumors ^ | July 6, 2016 | by Joe Rossignol
    What is Backdoor.MAC.Eleanor? Backdoor.MAC.Eleanor is new macOS malware arising from a malicious third-party app called EasyDoc Converter, which poses as a drag-and-drop file converter. What is EasyDoc Converter? "EasyDoc Converter.app" is a third-party Mac app that poses as a drag-and-drop file converter. The app has the following fake description:EasyDoc Converter is a fast and simple file converter for OS X. Instantly convert your FreeOffice (.fof) and SimpleStats (.sst) docs to Microsoft Office (.docx) by dropping your file onto the app. EasyDoc Converter is great for employees and students looking for a simple tool for quickly convert files to the popular...
  • Apple users targeted in first known Mac ransomware campaign

    03/06/2016 7:55:57 PM PST · by Swordmaker · 11 replies
    Yahoo News ^ | March 6, 2016
    By Jim Finkle BOSTON (Reuters) - Apple Inc customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks Inc told Reuters on Sunday. Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, then typically asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data. Security experts estimate that ransoms total hundreds of millions of dollars a year from such cyber criminals, who typically target users of...
  • Brian Sandoval: Obama’s GOP Trojan Horse for the Supreme Court

    02/25/2016 7:55:27 AM PST · by Nachum · 16 replies
    National Review ^ | 2/15/16 | John fund
    The Wall Street Journal reports that the White House is vetting Nevada’s Republican governor Brian Sandoval for the Supreme Court. On Sunday night, Governor Sandoval sat at the president’s head table at a White House dinner in Washington. The next day, the governor requested and secured a meeting with Harry Reid, the Democratic Senate minority leader from his home state. Reid has put Sandoval on the short list of recommended candidates he has sent to the White House. The fix may be in, and it would be horrific news for conservatives: Sandoval is the most liberal of the country’s 29...
  • Dyreza trojan evolves for Windows 10

    11/26/2015 6:20:04 PM PST · by Utilizer · 29 replies
    itnews.com.au ^ | Nov 23 2015 6:40AM (AUS) | Max Metzger
    ... Notorious banking trojan Dyreza has evolved to target the Windows 10 operating system, according to cyber-security firm Heimdall. The new feature of this pernicious strain of malware includes support for Windows 10, so cyber-criminals can stay up to date with the developments of their prey as well as the ability to latch on to Microsoft Edge, Window's 10's replacement for the much-maligned internet explorer. Heimdall also noted that this new version of Dyreza “kills a series of processes linked to endpoint security software, in order to make its infiltration in the system faster and more effective”. Nearly 100,000 machines...
  • CryptoWall 4.0 the nastiest strain yet

    11/10/2015 6:00:08 AM PST · by Utilizer · 18 replies
    iTnews.com.au ^ | Nov 10 2015 9:16AM (AUS) | Allie Coyne
    The fourth version of the CryptoWall ransomware has landed in the wild, equipped with better evasion techniques and tactics to thwart antivirus protection and detection. Ransomware attacks computers and encrypts user files and folders via infected email attachments, with attackers demanding ransom payments to unlock the scrambled documents. Users are told to make the payment by a specific deadline or risk having the private key to unlock the files deleted. The active CryptoWall ransomware spawned from CryptoLocker, which is thought to have extorted more than $3 million from victims before the botnet used to distribute it - Gameover Zeus -...
  • Malware warning on FreeRepublic

    10/27/2015 7:53:57 PM PDT · by TheBattman · 26 replies
    10-27-2015 | Me
    Updated from the beta program OS 10.11.1 to the recently full release version. Immediately, every link to a discussion on Freerepublic returns this: MacBook Pro OS X 10.11.1 (El Capitan)
  • "Help with computer"

    09/22/2015 3:50:56 PM PDT · by Dick Vomer · 41 replies
    self ^ | 9/22/2015 | me
    I've been unable to even pull up a local bank on my internet browsers ( Firefox and Safari). The website itself will not load. Just spinning until the request times out. What's odd is that my wife us
  • Stealthy Dopant-Level Hardware Trojans [govt funded research to defeat encryption]

    09/13/2013 6:11:57 AM PDT · by markomalley · 16 replies
    Slashdot ^ | 9/13/2013
    "A team of researchers funded in part by the NSF has just published a paper in which they demonstrate a way to introduce hardware Trojans into a chip by altering only the dopant masks of a few of the chip's transistors. From the paper: 'Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips."'...
  • COMPUTER VIRUS QUESTION: What Is THREAT "OSX/CLICKAGENT.FLA" Found In "opr0ETEF.tmp" File ?

    08/20/2013 4:33:36 PM PDT · by Yosemitest · 48 replies
    VirusBarrier X6 Scan and Quarantine | Aug 20, 2013 | Yosemitest
    What is THREAT "OSX/CLICKAGENT.FLA" found in "opr0ETEF.tmp" file ? Notice the file name is using a ZERO after the "opr" . It was found just now with a firewall activity alert. Here's what the general information on the file says: Kind: Unix Executable File Size: 66KB on disk (61,836 bytes) Where: /Volumes/Untitled/Documents and Settings/(User Name)/Local Settings/Application Data/Opera/My Opera Web Browser/cache/g_0018 Created: Thursday, August 9, 2012 7:36 AM Modified: Thursday, August 9, 2012 7:36 AM It's under QUARANTINE now, and I'm looking to destroy it by "shreading" or "wiping" ? Any suggestions?
  • Hagel pushes wealth redistribution to Third World & other dangerous stuff

    01/20/2013 8:29:13 PM PST · by EinNYC · 11 replies
    KleinOnline.wnd ^ | January 20, 2013 | Aaron Klein
    Chuck Hagel, President Obama’s nominee for Defense Secretary, sits on the board of numerous globalist groups that promote major increases in U.S. government funding for the third world. Hagel is a board member of the U.S. Global Leadership Coalition , a broad-based influential network of businesses, policy makers, national security and foreign policy experts; and business, faith-based, academic and community leaders pushing for more U.S. funding for diplomacy and third world development...One recent report entitled, Building a Better, Safer World, calls for the elevation of “global poverty” with increased U.S. humanitarian assistance worldwide...The Global Leadership Coalition includes an advisory board...
  • How to remove a computer virus

    12/14/2012 11:35:39 PM PST · by dennisw · 30 replies
    komando ^ | komando
    How to remove a computer virus QUICK SIMPLE VIDEO http://www.tvkim.com/watch/2555/kim-on-komand-how-to-remove-a-computer-virus?utm_medium=nl&utm_source=tvkim&utm_content=2012-12-14-article-screen-shot-b Computer viruses are the most dreaded inhabitants of the digital world! Here's how to kill them dead. Visit my security center for more detailed tips:      http://www.komando.com/securitycenter  
  • Menino gets bad vibe from proposed sex toy giveaway

    10/18/2012 8:58:07 AM PDT · by massmike · 43 replies
    bostonherald.com ^ | 10/15/2012 | Dave Wedge
    Trojan is not feeling the love in the Hub as Mayor Thomas M. Menino pushes the condom king’s New York marketing firm to pull the plug on plans to hand out free vibrators on family-friendly City Hall Plaza. Legally, the city may have no leg to stand on as officials acknowledged the “public nature” of the plaza provides constitutional “protection” for the company to distribute the pulsing plastic wands. In a statement, Trojan said: “We are pleased to be working with the City of Boston to bring the buzz to Bostonians with the Trojan Vibrations Pleasure Carts. With this vibrator...
  • New Trojan Backdoor Malware Targets Mac OS X And Linux, Steals Passwords And Keystrokes

    09/01/2012 8:34:42 AM PDT · by grey_whiskers · 19 replies
    Forbes ^ | 8-31-2012 | Anthony WIng Kosner
    Russian anti-virus software maker Doctor Web, has identified, “The first Trojan in history to steal Linux and Mac OS X passwords.” BackDoor.Wirenet.1, is the first Trojan Horse program that works on the Mac OS X and Linux platforms that is, “designed to steal passwords stored by a number of popular Internet applications.” The company, which sells anti-virus software that, conveniently, protects you against the malware they are identifying, explains that, “When launched, it creates its copy in the user’s home directory. The program uses the Advanced Encryption Standard (AES) to communicate with its control server whose address is 212.7.208.65.” The...
  • City officials pull the plug on vibrator giveaway, leaving thousands dissatisfied

    08/10/2012 9:50:52 AM PDT · by EveningStar · 34 replies
    New York Post ^ | August 9, 2012 | Amber Sutherland, Jennifer Bain and Todd Venezia
    They must have rubbed Mayor Bloomberg the wrong way. City officials pulled the plug on a vibrator giveaway by the Trojan condom company yesterday, disappointing potentially thousands of pleasure-seeking women who hoped to get their hands on some no-cost sex toys.
  • New Apple Mac Trojan Called OSX/Crisis Discovered (Possibly not in wild)

    07/26/2012 10:34:10 AM PDT · by zeugma · 14 replies
    Intego ^ | July 24, 2012 | Lysa Myers
    Update – July 25, 2012 10:30AM PDT This threat may run on Leopard 10.5, but it has a tendency to crash. It does not run on the new Mountain Lion 10.8. _______ Intego has discovered a new Trojan called OSX/Crisis. This threat is a dropper which creates a backdoor when it’s run. It installs silently, without requiring a password, and works only in OSX versions 10.6 and 10.7 – Snow Leopard and Lion. The Trojan preserves itself against reboots, so it will continue to run until it’s removed. Depending on whether or not the dropper runs on a user...
  • July 9th, FBI Pulls Plug on Infected PC's (link to self-check)

    07/06/2012 8:49:36 AM PDT · by Stayfree · 31 replies
    PRWeb ^ | July 6, 2012 | Unknown
    On Monday, July 9th, the FBI will pull the plug on internet access to hundreds of thousands of computers infected with a malware Trojan known as DNSChanger. Even if your computer is clean, companies that have compromised systems in their network will be taken offline, hindering their ability to do business and possibly breaking their websites, in what many are referring to as “Internet Doomsday.”