Image Gallery: April's cyber threat landscape

According to a research released by Google, scareware now accounts for 15% of all the malware that the company is detecting. The true scale of the problem is, however, much more disturbing since the cybercriminals behind these campaigns have been actively tricking search engines' crawlers for a few years now. Read the original article: Google: Scareware accounts for 15 percent of all malware
This professionally looking window of a ransomware known as the ICPP copyright violation alert, has affected a huge number of Internet users, using propagation tactics already in use by scareware. The scam required the user to pay $400, perhaps the largest amount of money ever requested for this type of scams. Read the original article: Copyright violation alert ransomware in the wild
The sample payment page, where the end user is provided with a bogus bill for his/her copyright infringement activities. Read the original article: Copyright violation alert ransomware in the wild
Upon successful infection, the wallpaper on the end user's PC is changed to the following wallpaper. Read the original article: Copyright violation alert ransomware in the wild
With a huge number of people still affected with the scam, the single most effective way of removing it, is by entering a working license code/key. Read the original article: How to remove the ICPP Copyright Violation Alert ransomware
Once the license code is entered, the ransomware executes uninstall.exe, which completely removes it from the end user's PC. Read the original article: How to remove the ICPP Copyright Violation Alert ransomware
What’s more devastating than a DDoS attack launched by a botnet? In some cases, that’s the DDoS attack launched by the “opt-in botnet” aggregated through a crowdsourcing campaign. Photo courtesy of Damballa. Read the original article: Attack of the Opt-In Botnets
This DIY DoS (Denial of Service Attack) tool, showcases the "workstation" of a potential participant in a opt-in/crowdsourcing driven botnet campaign. Read the original article: Attack of the Opt-In Botnets
Cybercriminals are actively multitasking these days. For instance, visiting the page of this phishing campaign, will load a tiny IFRAME, which will then attempt to launch client-side exploits against the end user. Read the original article: Facebook phishing campaign serving ZeuS crimeware
This DIY DoS (Denial of Service Attack) tool, was released by Chinese hacktivists in their successful campaign to attack and take down CNN.com Read the original article: Attack of the Opt-In Botnets
Intego reported on a newly discovered sample of a Mac OS X malware first detected in 2004. The source code, including a DIY manual for the configuration of the malware, are already distributed across cybecrime-friendly online communities. Read the original article: New Mac OS X malware variant spotted
A MarkMonitor review of the adoption of VeriSign’s Registry Lock Service launched at the beginning of the year, shows that less than 10% of the top 300 most highly trafficked sites were protected using it. Graph courtesy of MarkMonitor for ZDNet. Read the original article: Hundreds of high profile sites unprotected from domain hijacking
Security researchers from the Information Warfare Monitor (Citizen Lab and SecDev) released the “Shadows in the Cloud” report. Photo courtesy of Citizen Lab/SecDev and the ShadowServer Foundation. Read the original article: Researchers expose complex cyber espionage network
What's the driving force behind the growth of cybercrime? DIY ZeuS crimeware kits and outdated Adobe vulnerabilities, according to Symantec's report. Photo courtesy of Symantec. Read the original article: Report: ZeuS crimeware kit, malicious PDFs drive growth of cybercrime
The ZeuS crimeware ecosystem remains in tact, despite the minor disruption seen in this chart. Photo courtesy of the ZeusTracker. Read the original article: Report: ZeuS crimeware kit, malicious PDFs drive growth of cybercrime