Originally posted by elmo.
Date Name
Mar 14, 2012 Faketoken
Mar 15, 2012 Boxer
Mar 20, 2012 Antammi
Mar 22, 2012 TGLoader
Mar 29, 2012 DKFBootKit ...
Wednesday, April 4, 2012
Fake Google Play
Posted on Wednesday, April 04, 2012 by Red Horse
| No comments
Originally posted by elmo.
This fake google play site serves a malicious file called, google_play.apk which tricks russian users into thinking that they are the legitimate si...
Google Authenticator updated
Posted on Wednesday, April 04, 2012 by Red Horse
| No comments
Originally posted by elmo.
Google recently updated Google Authenticator to version 2.15.
What's in this version:
1. New entry for Google Play, same great app
2. Updated look and feel
3. "Scan barcode" and "Manually add account" options moved to Menu > Add account.
When your phone is not connected to any network, Google Authenticator can be used to generate a valid verification code.
The verification code generated is then used in Google's...
VX Heavens goes offline
Posted on Wednesday, April 04, 2012 by Red Horse
| No comments
Originally posted by elmo...
Thursday, March 22, 2012
NSA Mobility Program
Posted on Thursday, March 22, 2012 by Red Horse
| No comments
Originally posted by elmo.
The NSA or National Security Agency recently established the NSA Mobility Program to focus on delivering secure mobile capability using commercial technologies to the United States Government (USG) and Department of Defense (DOD).
They have also identified 5 major categories of the mobile ecosystem in a document called Mobility Capability Package:
1. Secure Voice
2. OS/Apps & Mobile Device
3. Mobile Transport...
Monday, March 19, 2012
The 2012 Cyber Defence University Challenge
Posted on Monday, March 19, 2012 by Red Horse
| No comments
Originally posted by elmo.
To raise awareness in cyber security, the Australian government in partnership with Australian universities and Telstra challenges university undergraduates to join in the Challenge.
The Challenge is 24 hour competition related to security and will start on April 3 and end on April 4, 2012.
The winner will have the opportunity to travel to Las Vegas, USA in July 2012 to join in Black Hat's 2012 Conference.
For...
Sunday, March 18, 2012
Double Winrar self-executable archive packed Fakeav
Posted on Sunday, March 18, 2012 by Red Horse
| No comments
Originally posted by marc.
Malware authors have been using packers/compression programs to confuse AV detection engines. Here's one mildly annoying technique that I stumbled upon last week.
Step 1. Pack file with Asprotect packer
Step 2. Create a password protected Winrar sfx archive using the file in step 1.
Step 3. Create another Winrar sfx archive using the file...
Tuesday, March 13, 2012
Fake Skype Vouchers website leads to Java Exploits
Posted on Tuesday, March 13, 2012 by Red Horse
| No comments
Originally posted by kazmot.
I stumbled upon a fake website that targets Skype users through vouchers or gift certificates. Below is the definition of Skype vouchers from their website:
Skype vouchers are electronic Skype Credit vouchers sold in various retail outlets. You don’t have to pay for the vouchers online and they make a great gift for family and friends...
Thursday, March 8, 2012
AV-TEST Report on Android Anti-Malware Solutions
Posted on Thursday, March 08, 2012 by Red Horse
| No comments
Originally posted by elmo.
AV-Test an independent IT security company recently published a test report on different anti-malware product available for android.
It is worth noting that they have tested 41 anti-malware products!
Too many in such a short period and some of the solutions have 0% detections.
So choose wisely and pick an anti-malware product in the top ha...
Wednesday, March 7, 2012
Justin Bieber Facebook Spam
Posted on Wednesday, March 07, 2012 by Red Horse
| No comments
Originally posted by elmo.
Title: LOL!!! There was a hidden c@mera in Justin's bedroo...
Tuesday, March 6, 2012
Fake Intuit Quickbooks Page Leads to Black Hole Exploit
Posted on Tuesday, March 06, 2012 by Red Horse
| No comments
Originally posted by kazmot.
The Blackhole Exploit kit is still a very popular attack on the web. Malwares use this exploit kit to propagate and infect unsuspecting users. Here is a detailed analysis of a fake Intuit page that leads to the exploit kit and the obfuscation technique used by the attack. In this specific targeted attack, we were able to download a Cridex...
AXMLPrinter2
Posted on Tuesday, March 06, 2012 by Red Horse
| No comments
Originally posted by elmo.
AXMLPrinter2 or AXMLPrinter version 2 is a tool that uses AXmlResourceParser to convert a binary xml file to readable xml document.
Prerequisite:
JDK (java development kit) needs to be installed in your system.
Download:
AXMLPrinter2.jar
Syntax:
1. go to the folder where you downloaded AXMLPrinter2
2. open a command prompt
3. type and execute "java -jar AXMLPrinter2.jar <location of xml file> >> <ouput...
Black Hole exploit kit
Posted on Tuesday, March 06, 2012 by Red Horse
| No comments
Originally posted by kazmot.
The Black Hole exploit kit is an unethical off-the-shelf Web application. The first instance - v.1.0.0 beta - has appeared on the black market and was advertised in August 2010 as a "System for network testing". As with most of the exploit kits, it is based on PHP and a MySQL backend. The payload of this kit usually targets Windows operating systems and applications installed on those systems,...
Monday, March 5, 2012
CrimePack exploit kit
Posted on Monday, March 05, 2012 by Red Horse
| No comments
Originally posted by kazmot.
CrimePack exploit kit is just like any other exploit kits. It contains various codes that exploit vulnerabilities in a system and also in some of the applications installed. Commonly, these exploit codes download and execute an arbitrary file in the system. We were able to download a Dorkbot Worm in one of the malicious link we got from malwaredomainlist.com (MD5 hash: 9210a2635c63a58af18ed5dffb8f01e8, VirusTotal...
Friday, March 2, 2012
Installing Ubuntu 10.04.1 LTS 64 bit, MongoDB 2.0.3, Lamp, and RockMongo
Posted on Friday, March 02, 2012 by Red Horse
| 1 comment
Originally posted by elmo.
1. Installing Ubuntu 10.04.1 LTS 64-bit
1.1 go to ubuntu download page1.2 select Ubuntu 10.04 LTS1.3 select 64-bit1.4 then click Start download (you will download an iso image)1.5 burn iso image to disc1.6 install Ubuntu using disc
Notes:
We have selected 64-bit as MongoDB only supports 2 GB of data for 32-bit builds.Another cool ubuntu installer is Wubi or Windows Ubuntu Installer which will allow you to install...
Thursday, March 1, 2012
Baksmali
Posted on Thursday, March 01, 2012 by Red Horse
| No comments
Originally posted by elmo.
Baksmali means disassembler in Icelandic language and it is used to dissassemble a dex file.
Prerequisite:
JDK (java development kit) needs to be installed in your system.
Download:
baksmali-x.x.x.jar
Syntax:
1. go to the folder where you downloaded baksmali
2. open a command prompt
3. type and execute "java -jar baksmali-x.x.x.jar <location of dex file>"
e.g. d:\tools>java -jar baksmali-1.3.2.jar d:\test\classes.dex
4....
Wednesday, February 29, 2012
Ubuntu for Android
Posted on Wednesday, February 29, 2012 by Red Horse
| No comments
Originally posted by elmo.
Reference:
Ubu...
Android Malware February 2012 Roundup
Posted on Wednesday, February 29, 2012 by Red Horse
| No comments
Originally posted by elmo.
Date
Name
Feb 03, 2012 RootSmart
Feb 06, 2012 FakeRun
Feb 13, 2012 PushBot
Feb 14, 2012 FakeClick
Feb 15, 2012 Gappusin
Feb 17, 2012 Loicdos
Feb 20, 2012 LeadBolt
Feb 23, 2012 Fakeapp
Feb 23, 2012 Opfake.B
Feb 25, 2012...
Thursday, February 23, 2012
TitanMist Tutorial
Posted on Thursday, February 23, 2012 by Red Horse
| No comments
Originally posted by Frederic Vila.
[caption id="" align="aligncenter" width="240" caption="TitanMist Logo"][/caption]
The intended audience for this brief tutorial requires knowledge on using Windows command line tools and some basic debugging. It also requires installation of the following free tools or applications.
Python 2.7 (http://www.python.org/ftp/python/2.7/python-2.7.msi)
TitanMist...
Wednesday, February 22, 2012
Originally posted by elmo.
Google has developed a service called Bouncer which automatically scans the official Android Market for Potentially Unwanted Programs or PUP.
Bouncer will perform the following services:
1. scans the uploaded app against known malwares and spywares.
2. use behavioral scanning to check for known malicious behavior.
3. check new developer account and prevent repeat-offending account from uploading ap...
Friday, February 17, 2012
Foncy
Posted on Friday, February 17, 2012 by Red Horse
| No comments
Originally posted by elmo.
[galle...
FakeTimer
Posted on Friday, February 17, 2012 by Red Horse
| No comments
Originally posted by elmo.
[gallery link="file" order="DES...
RootSmart
Posted on Friday, February 17, 2012 by Red Horse
| No comments
Originally posted by elmo.
[gallery link="file" order="DES...
Wednesday, February 15, 2012
Smspacem
Posted on Wednesday, February 15, 2012 by Red Horse
| No comments
Originally posted by elmo.
[galle...
Fakeplayer
Posted on Wednesday, February 15, 2012 by Red Horse
| No comments
Originally posted by elm...
Thursday, February 9, 2012
Android History
Posted on Thursday, February 09, 2012 by Red Horse
| No comments
Originally posted by elmo.
A compressed android history.
Source:
Wikipe...
Wednesday, February 8, 2012
Android Malware History
Posted on Wednesday, February 08, 2012 by Red Horse
| No comments
Originally posted by elmo.
Date
Name
Aug 10, 2010 FakePlayer.a
Aug 12, 2010 TapSnake
Sep 09, 2010 FakePlayer.b
Oct 13, 2010 FakePlayer.c
Nov 12, 2010 SMS Replicator Secret
Dec 29, 2010 Geinimi
Feb 14, 2011 Adrd
Feb 22, 2011 Pjapps
Mar 01, 2011 DroidDream...
Subscribe to:
Posts (Atom)