X

Image Gallery: April's cyber threat landscape

Facebook phishing campaigns serving ZeuS crimeware, new Mac OS X malware variant, yet another cyber espionage network exposed, next to several reports detailing Opt-In botnets and how outdated vulnerabilities drive the growth of cybercrime - April, 2010 was a busy month for the security community.
By Dancho Danchev, Contributor
418802.jpg
1 of 15 Dancho Danchev/ZDNET

According to a research released by Google, scareware now accounts for 15% of all the malware that the company is detecting. The true scale of the problem is, however, much more disturbing since the cybercriminals behind these campaigns have been actively tricking search engines' crawlers for a few years now. Read the original article: Google: Scareware accounts for 15 percent of all malware

418803.jpg
2 of 15 Dancho Danchev/ZDNET

This professionally looking window of a ransomware known as the ICPP copyright violation alert, has affected a huge number of Internet users, using propagation tactics already in use by scareware. The scam required the user to pay $400, perhaps the largest amount of money ever requested for this type of scams. Read the original article: Copyright violation alert ransomware in the wild

418804.jpg
3 of 15 Dancho Danchev/ZDNET

The sample payment page, where the end user is provided with a bogus bill for his/her copyright infringement activities. Read the original article: Copyright violation alert ransomware in the wild

418805.jpg
4 of 15 Dancho Danchev/ZDNET

Upon successful infection, the wallpaper on the end user's PC is changed to the following wallpaper. Read the original article: Copyright violation alert ransomware in the wild

418806.png
5 of 15 Dancho Danchev/ZDNET

With a huge number of people still affected with the scam, the single most effective way of removing it, is by entering a working license code/key. Read the original article: How to remove the ICPP Copyright Violation Alert ransomware

418807.png
6 of 15 Dancho Danchev/ZDNET

Once the license code is entered, the ransomware executes uninstall.exe, which completely removes it from the end user's PC. Read the original article: How to remove the ICPP Copyright Violation Alert ransomware

418808.png
7 of 15 Dancho Danchev/ZDNET

What’s more devastating than a DDoS attack launched by a botnet? In some cases, that’s the DDoS attack launched by the “opt-in botnet” aggregated through a crowdsourcing campaign. Photo courtesy of Damballa. Read the original article: Attack of the Opt-In Botnets

418809.jpg
8 of 15 Dancho Danchev/ZDNET

This DIY DoS (Denial of Service Attack) tool, showcases the "workstation" of a potential participant in a opt-in/crowdsourcing driven botnet campaign. Read the original article: Attack of the Opt-In Botnets

418810.png
9 of 15 Dancho Danchev/ZDNET

Cybercriminals are actively multitasking these days. For instance, visiting the page of this phishing campaign, will load a tiny IFRAME, which will then attempt to launch client-side exploits against the end user. Read the original article: Facebook phishing campaign serving ZeuS crimeware

418811.jpg
10 of 15 Dancho Danchev/ZDNET

This DIY DoS (Denial of Service Attack) tool, was released by Chinese hacktivists in their successful campaign to attack and take down CNN.com Read the original article: Attack of the Opt-In Botnets

418812.png
11 of 15 Dancho Danchev/ZDNET

Intego reported on a newly discovered sample of a Mac OS X malware first detected in 2004. The source code, including a DIY manual for the configuration of the malware, are already distributed across cybecrime-friendly online communities. Read the original article: New Mac OS X malware variant spotted

418813.png
12 of 15 Dancho Danchev/ZDNET

A MarkMonitor review of the adoption of VeriSign’s Registry Lock Service launched at the beginning of the year, shows that less than 10% of the top 300 most highly trafficked sites were protected using it. Graph courtesy of MarkMonitor for ZDNet. Read the original article: Hundreds of high profile sites unprotected from domain hijacking

418814.jpg
13 of 15 Dancho Danchev/ZDNET

Security researchers from the Information Warfare Monitor (Citizen Lab and SecDev) released the “Shadows in the Cloud” report. Photo courtesy of Citizen Lab/SecDev and the ShadowServer Foundation. Read the original article: Researchers expose complex cyber espionage network

418815.png
14 of 15 Dancho Danchev/ZDNET

What's the driving force behind the growth of cybercrime? DIY ZeuS crimeware kits and outdated Adobe vulnerabilities, according to Symantec's report. Photo courtesy of Symantec. Read the original article: Report: ZeuS crimeware kit, malicious PDFs drive growth of cybercrime

418816.png
15 of 15 Dancho Danchev/ZDNET

The ZeuS crimeware ecosystem remains in tact, despite the minor disruption seen in this chart. Photo courtesy of the ZeusTracker. Read the original article: Report: ZeuS crimeware kit, malicious PDFs drive growth of cybercrime

Related Galleries

Holiday wallpaper for your phone: Christmas, Hanukkah, New Year's, and winter scenes
Holiday lights in Central Park background

Related Galleries

Holiday wallpaper for your phone: Christmas, Hanukkah, New Year's, and winter scenes

21 Photos
Winter backgrounds for your next virtual meeting
Wooden lodge in pine forest with heavy snow reflection on Lake O'hara at Yoho national park

Related Galleries

Winter backgrounds for your next virtual meeting

21 Photos
Holiday backgrounds for Zoom: Christmas cheer, New Year's Eve, Hanukkah and winter scenes
3D Rendering Christmas interior

Related Galleries

Holiday backgrounds for Zoom: Christmas cheer, New Year's Eve, Hanukkah and winter scenes

21 Photos
Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza
img-8825

Related Galleries

Hyundai Ioniq 5 and Kia EV6: Electric vehicle extravaganza

26 Photos
A weekend with Google's Chrome OS Flex
img-9792-2

Related Galleries

A weekend with Google's Chrome OS Flex

22 Photos
Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup
shutterstock-1024665187.jpg

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup

8 Photos
Inside a fake $20 '16TB external M.2 SSD'
Full of promises!

Related Galleries

Inside a fake $20 '16TB external M.2 SSD'

8 Photos