One Article Review

Accueil - L'article:
Source SecurityWeek.webp SecurityWeek
Identifiant 535496
Date de publication 2018-03-22 16:54:01 (vue: 2018-03-22 16:54:01)
Titre You Can DDoS an Organization for Just $10 per Hour: Cybercrime Report (Recyclage)
Texte The cost of having an organization targeted by a distributed denial of service (DDoS) attack for an hour is as low as $10, cybersecurity firm Armor says. The low cost of launching such attacks results from the proliferation of cybercrime-as-a-service, one of the most profitable business models adopted by cybercriminals over the past years. It allows criminals-wannabe to employ the resources of established cybercriminals for their nefarious purposes, including malware distribution, DDoS-ing, spam, and more. All that miscreants have to do is to access underground markets or forums and hire the desired cybercrime service to conduct the malicious actions for them. And while the incurred financial losses total billions or even more for affected organizations, the price of hiring such a service is highly affordable to anyone. According to Armor's The Black Market Report: A Look into the Dark Web
Envoyé Oui
Condensat $10 2018 addresses adopt april arghire arghire:you bay can ciso columns conference correspondent cyber cybercrime data data: ddos exfiltrate exfiltration forum hackers half hour: hsts ics industry international ionut just leverages linked links methodsandroid moon new news oct online organization per previous register report reportiran researcherapple sandbox security securityweek services singapore sponsored tags: telegram tracking trojan usa used user webkit
Tags Guideline
Stories
Notes
Move


Les reprises de l'article (1):
Source SecurityWeek.webp SecurityWeek
Identifiant 533576
Date de publication 2018-03-21 16:02:05 (vue: 2018-03-21 16:02:05)
Titre Android Trojan Leverages Telegram for Data Exfiltration (Recyclage)
Texte A newly discovered Android Trojan is abusing Telegram's Bot API to communicate with the command and control (C&C) server and to exfiltrate data, Palo Alto Networks security researchers warn. Dubbed TeleRAT, the malware appears to be originating from and/or to be targeting individuals in Iran. The threat is similar to the previously observed IRRAT Trojan, which uses Telegram's bot API for C&C communication only. Still active in the wild, IRRAT masquerades as applications supposedly informing users on the number of views their Telegram profile received (something that Telegram doesn't actually allow for). After the app's first launch, the malware creates and populates a series of files on the phone's SD card, which it then sends to an upload server. The files contain contact information, a list of Google accounts registered on the phone, SMS history, a picture taken with the front-facing camera, and a picture taken with back-facing camera. The malicious app reports to a Telegram bot, hides its icon from the phone's app menu, and continues to run in the background, waiting for commands. TeleRAT, on the other hand, creates two files on the device, one containing various device information (including system bootloader version number, available memory, and number of processor cores), and another containing a Telegram channel and a list of commands, Palo Alto Net
Envoyé Oui
Condensat 2018 android bay ciso conference cyber data exfiltration forum half ics industry leverages links malware mobile moon news oct register security sponsored tags: telegram trojan usa
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris sur un précédent.
My email: