Introduction
There are numerous computer systems around the world that are under the control of malicious actors.These compromised computers,often known as zombies,form a botnet that receives and executes commands from botnet operators who harvest passwords,credit card numbers,and sensitive information from the zombies.Botnet operators also put the “zombies” to work by forcing them to send spam messages,create fraudulent accounts,and host malicious files.Rather than relying on sophisticated technical exploits,some botnet operators simply trick users into compromising themselves.Through fake Web sites,users are encouraged to download malicious software masquerading as benign.Sometimes,these fake,malicious Web sites are sent to users by their contacts on social networking sites.The rise of social networking tools has given attackers a platform to exploit the trust that individuals have in one another.People are much more likely to execute a malicious file if it has been sent to them by someone they know and trust.The information that individuals post online and the interests contained within their profile information can also be used to lure individuals into executing malicious software.Koobface is a botnet that leverages social networking platforms to propagate.
The operators of the botnet(known as Ali Baba and 40 LLC)have developed a system that uses social networking platforms,such as Bebo,Facebook,Friendster,Fubar,Hi5,MySpace,Netlog,Tagged,Twitter,and Yearbook,to send messages containing malicious links.These links are often concealed using the URL shortening service bit.ly and sometimes redirects to Blogspot blogs that redirect users to false YouTube pages hosted on compromised Web servers. These pages encourage users to download malicious software masquerading as a video codec or a software upgrade.Koobface also uses search engine optimization (SEO) techniques that allow these malicious sites to be listed highly in search engine results for popular search terms.
Download: PDF
Volut-ID | World News Articles
All news of interest and can provide an info for you, and so can assist in the search for new news.
About news gadgets, mobile phones
info about the latest mobile phone, from news, features, and the most mobile phone models in search of the world.
Koobface: Inside a Crimeware Network
Related Post
Papers
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- Securing The Kernel via Static Binary Rewriting and Program Shepherding
- 2011 Data Breach Investigations Report
- 2011 Data Breach Investigations Report
- Mozilla Firefox Internals & Attack Strategies
- Mozilla Firefox Internals & Attack Strategies
- Web application vulnerabilities in context of browser extensions
- Web application vulnerabilities in context of browser extensions
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
- Credit Card skimming and PIN harvesting in an EMV world
- Credit Card skimming and PIN harvesting in an EMV world
- Exposing the Lack of Privacy in File Hosting Services
- Exposing the Lack of Privacy in File Hosting Services
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Leaking browsing history via user interaction and side channel attacks
- Leaking browsing history via user interaction and side channel attacks
- HTTP Geolocation
- HTTP Geolocation
- HITB Magazine Issue 005 released
- HITB Magazine Issue 005 released
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- Trustwave's Global Security Report 2011: Web Application Risks
Malware
- YARA v.1.5 released
- YARA v.1.5 released
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- THE CYBER-CRIME BLACK MARKET: UNCOVERED
- THE CYBER-CRIME BLACK MARKET: UNCOVERED
- REMnux v.2.0 Released
- REMnux v.2.0 Released
- PandaLabs Annual Report 2010
- PandaLabs Annual Report 2010
- Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
- Zozzle: Low-overhead Mostly Static JavaScript Malware Detection
- Koobface: Inside a Crimeware Network
- The Zeus malware R&D program
- The Zeus malware R&D program
- Kaspersky download site hacked to spread fake AV
- Kaspersky download site hacked to spread fake AV
- W32.Stuxnet Dossier
- W32.Stuxnet Dossier
- Stuxnet Under the Microscope
- Stuxnet Under the Microscope
- The Rise of PDF Malware
Botnet
- Botnets: Measurement, Detection, Disinfection and Defence
- Botnets: Measurement, Detection, Disinfection and Defence
- Symantec Report on Attack Kits and Malicious Websites
- Symantec Report on Attack Kits and Malicious Websites
- Smartphone Botnets over SMS Demo
- Smartphone Botnets over SMS Demo
- Researcher will release Smartphone Botnet PoC code at Shmoocon
- Researcher will release Smartphone Botnet PoC code at Shmoocon
- Koobface: Inside a Crimeware Network
- The Botnet Chronicles
- The Botnet Chronicles
- The Zeus malware R&D program
- The Zeus malware R&D program
- Security firm warns of commercial, on-demand DDoS botnet
- Security firm warns of commercial, on-demand DDoS botnet
- Mumba Botnet Disclosed
- Mumba Botnet Disclosed
- Botnet Exploits PDF Flaw
- Botnet Exploits PDF Flaw
- Botnet with integrated copy protection
- Botnet with integrated copy protection
- The Command Structure of the Aurora Botnet
- The Command Structure of the Aurora Botnet
No response to “Koobface: Inside a Crimeware Network”
Leave a reply