Same attack recipe, with slight changes: one day, FB fans are
Tag - file
Rather unusual activity has been analyzed this week. We have a worm that uses window titles to receive commands and a family which has not been seen spreading...
The answer is simple: no. No matter how intuitive (and rather successful) it's spreading method is, this virus does no harm to any of the systems it comes in...
This week a pretty simple but recyclable IRCBot caught out attention. Besides the fact that it allows remote control of the infected machine by the attacker...
Nothing fancy this week. We got a Visual Basic worm (again) running completely hidden under the Windows Scripting Host, a removable drives infecting Trojan and...
This week we stumbled across a new version of the Cutwail botnet (also known as Pandex or Pushdo). We've takes the liberty to analyze its main components and...
It is a known fact that some e-threats use instant messaging applications to spread. Did you ever wonder how it's done? Well this week, we have a worm that...
This week we ended up analyzing a whole infection chain, from its source to the end result. The process starts with a maliciously crafter website and ends with...
They don't like antivirus products. I don't know why, they're so friendly, they take care of our computers, protect our data and identity, but they still don't...
Recent shouts