OFFICIAL SECURITY BLOG

Monthly Archives: January 2013

Malwarebiter – Biting down on you

January 30, 2013 | BY

UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst Adam Kujawa released a Cyber-Threat Advisory on a fairly new anti-malware product on the web called “Malwarebiter”.  This product grabbed our attention because of its similar name to Malwarebytes.  

CTA: Malwarebiter.com

January 25, 2013 | BY

URGENT: Malwarebytes mimic site ‘Malwarebiter(dot)com’ hosts fake anti-malware product and spreads malware. ACTION: Do NOT visit ‘Malwarebiter(dot)com‘ unless you are using a secured environment (i.e. Virtual Machine or Sandbox)

Cyber Threats in 2012: Looking Both Ways

January 21, 2013 | BY

2012 was a dangerous year, packed with threats such as Drive-by exploits, Ransomware, phishing scams and state-sponsored malware.  Those who payed attention stayed safe by using anti-malware solutions combined with safe surfing practices and other defensive software.  However many people did not and unfortunately, millions of them became victims of cyber-crime.  Now that we have […]

CTA: Unpatched Java Exploit in the Wild

January 10, 2013 | BY

URGENT: New Java Exploit being used to infect Updated Users. ACTION: Disable Java Browser Plugin using: http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ http://krebsonsecurity.com/how-to-unplug-java-from-the-browser/ DETAILS: As of yesterday, a new Java exploit has been developed and released to the cyber-crime community. It is currently in the wild and being used to distribute malware such as the Reveton Ransomware.

Web Exploits: a bright future ahead

January 2, 2013 | BY

The majority of computers get infected from visiting a specially crafted webpage that exploits one or multiple software vulnerabilities. It could be by clicking a link within an email or simply browsing the net, and it happens silently without any user interaction whatsoever. Vulnerabilities are flaws that exist in various programs and that allow someone to […]