Friday, October 26, 2012

Spooky Internet Threats

1) FBI MoneyPak Trojan. They call it "ransomware." MoneyPak carries the official FBI logo at the top and displays your IP address, location, and the name of your ISP. It tells you your PC has been frozen and locked by federal authorities because you downloaded or distributed copyrighted material or viewed kiddie porn. This sophisticated intruder embeds itself inside your system via trojan horses which arrive unnoticed and secretly  download all the files needed for FBI Moneypak to do damage. Moneypak hijacks your computer and displays its pop-up message of misleading information about copyright and related rights law violation. In fact, it locks up your desktop, disables task manager and other system utilities to take full control and prevent any overrides by the user: it places a video recording square in the top right corner of the fake FBI warning page, which is "your built-in web camera." Interestingly, the square appears even if your laptop doesn’t have a built-in camera. [3rd party Removal instructions: TEXT | Video]

2) ‘eventvwr’ SCAM via telephone from Offshore Call Centers (usually in Mumbai) - it starts like this: "Do you have a windows PC?". This scam preys upon less tech-savvy folks. The scam goes like this: You get a call from a man or woman with an Indian accent bearing an American-sounding name like "Judy Johnson" who pretends to be a registered Microsoft technician. Guess what? Microsoft was informed that your IP address is the source for serious attacks on multiple servers and that your computer is infected. She then instructs you to press the "Windows" key (the one with the flag on it) and the "R" key. This calls up the "Run" window for typing commands directly into your OS. There are many directions the conversation could take from this point on, but somewhere along the line you will be instructed you to type "eventvwr" which initiates the Microsoft Windows Event Viewer, which lists logged events and typically contains many error messages. Know that that is NORMAL. If you ask the "tech" for any information on the source or target IP addresses involved, you will be told that she/he is unauthorized to provide such information!

They are looking for you to open the front door and let them into your computer, where they can harvest data, including passwords, credit cards, photographs, social networking information etc. via apps such as "Team Viewer" and "Ammyy Admin" remote desktop control software. If you don’t agree to purchase their services they will directly attack your harddrive!


3) Fake Virus Alerts / Scareware.  "MSREMOVAL TOOL" is one of a legion of Fake Virus removal programs that install themselves onto your PC and request Money to make them work. THEY WILL NOT WORK AND IF YOU PAY THEM THEY WILL  HAVE YOUR CREDIT CARD INFORMATION. I once picked one up as I was innocently searching Google Images for a good map of mainland China. I didn't even go to a website - all I did was click on the little image to see a larger version!  these little monsters also hide on blogs - especially on those popover/pageovers you come across on WordPress: they can inject themselves into the script so that the blog owner doesn't even know they are present!

I use a combination of free softwares: Malwarebytes and Super Anti-Spyware to deal with these pests!.

4) Toll fraud -- no, it's not driving through the E-Z pass lane when you pay cash. It's a growing threat to your smartphone, one of the biggest of the year, according to a recent study by security company Lookout Mobile. FakeInst SMS Trojan and its variants - exclusively target Smartphones! remember, your Android is a small computer! FakeInst disguises itself as popular apps like Instagram, Opera and Skype. It sends SMS messages to premium-rate numbers. There are more than a dozen variants of this bug and growing.Avast offers a wonderful FREE security software package for mobile phones. Be sure to download any apps from OFFICIAL sources only! There's MORE after the jump.
Led by Avi Turiel, director of threat research and market analysis, Commtouch's Internet Threat Analysis Team regularly publishes related statistics within its report. The quarterly report is compiled based on a comprehensive analysis of billions of daily transactions handled by Commtouch's GlobalView™ Cloud. The results for the third quarter of 2012 include:
  • 87 billion - The average number of daily spam/phishing emails sent
  • 74 percent - Percent of all email that was spam
  • 1.9 billion - The average number of daily emails sent with attached malware
  • Education - The Web site category most likely to contain malware
  • Pharmacy ads - The most popular spam topic, representing 41.2 percent of all spam
  • India - The country with the most zombies

    Read more here:

Show Comments: OR

No comments:

Post a Comment

Per comment rate: $2
Payable by either clicking the BitCoin "tip me" button or the PayPal "donate" button in the sidebar.

Because, like the fine publication Tablet, whom I borrowed this concept from, I too am committed to bringing you the best, smartest, most enlightening and entertaining reporting and writing I'm able to provide, all free of charge. I take pride in my loyal readership, and I'm thrilled that you choose to engage with me in a way that is both thoughtful and thought-provoking. But the Internet, for all of its wonders, poses challenges to civilized and constructive discussion, allowing vocal—and, often, anonymous—minorities to drag it down with invective (and worse).

I'm asking people who'd like to post comments on my blog to pay a nominal fee—less a paywall than a gesture of your own commitment to the cause of great conversation. All proceeds go to helping me bring you the provocative and/or entertaining articles that brought you here in the first place.

Readers can still interact with me FREE of charge via Facebook comments and Google+ comments! You can also reach me via Twitter @davelucas

I hope this new largely symbolic measure will help create a more pleasant and cultivated environment for all! Those of you who choose to contribute, thanks for your support.


Your comment will appear after you have made your donation.

All IP addresses are logged.

Your comment will not appear immediately as all messages are vetted before publication.

PS - Any more questions? Check out my Policy & Terms of Use FAQ!

Related Posts Plugin for WordPress, Blogger...
Web Analytics