Thursday, January 16, 2014

Flashback Trojan: An Overview of This Nasty Virus

Apple-based devices are best opted by users for their unmatched security benefits and advanced technology set in its design and functioning. It was once believed that an Apple-based device user never had to bother about any security breach or privacy issues – yes, such was the reputation of the brand that everything was considered pristine in this space.

And then came the Flashback Trojan that managed to break through the security gates of Apple devices and thereby put across the unprecedented question – is anything in this space actually pristine and far away from the clutches of malware?

If you are unknown to the exploits of the Flashback Trojan, here’s all that you need to know…
  • Flashback Trojan became the infamous virus to have attacked the Apple-based computers and other devices in 2011. The complete name for the virus is OSX/ Flashback.A.
  • Till date, this Trojan has managed to infect not less than 650,000 Apple computers and the number is only swelling ever since. It is particularly active in the USA, Canada, the UK, and Australia.
  • It disguises itself typically as a Flash Player package and prompts you into installing the same on your computer. Once you have run the file unsuspectingly, the virus will enter your computer or device and thereby start off its malicious activities.
  • It then creates backdoor entry for its creators and gives them an easy access to reach your crucial system files and sensitive data that you have saved on your device including username, passwords and other financial details. 
  • Apple had swiftly acted upon getting their consumers rid the Trojan from their computers. However, as per recent reports, the Trojan is still here functioning and infecting many more thousand computers with each passing day.
  • In addition to this, the very nature of the virus make it even more perilous and tricky to identify – it is self-encrypted, it can create a botnet and allow other hackers to use it (and manipulate it) according to their own requirements, it uses un-patched Java weaknesses to set itself up on your computer.
If the above has scared the wits out of you and you are looking for ways to fight off this Trojan, here’s a little piece of advice. Don’t leave any Java program on your Apple-based device un-patched or vulnerable. Also, scan your computer regularly to find out if there has been anything amiss. And for more details, watch out this space so that you are aware of any fixes that the company has released to thwart off the Flashback Trojan and its potentials. 

Friday, January 3, 2014

FBI Offered $50,000 for a Most Wanted Malware Writer

The Federal Bureau of Investigation (FBI) has spotted most wanted malware writer and offered huge rewards to extract information on cybercriminals. The news is confirmed as it was published on FBI website about all cybercriminals, telecom fraud, database hackers, and malware scam artists including this malware writer of ‘Lover Spy’ Carlos Enrique Perez-Melara. He is known to design this malware named ‘Lover Spy’ which is created to spy on suspecting husbands or wives who could be cheating on their partner. FBI has been after this malware writer for a long when a warrant was issued against him when this ‘Lover Spy’ Trojan which was developed “to catch a cheating lover" and was spread to target users via as an electronic greetings card.    

FBI has discovered that Carlos Enrique Perez-Melara has sold the virus to 1000 customers who have already distributed and infected about several thousands of users.  Though it is yet not known whether Perez-Melara is operating from the United States. Because FBI still had clues or leads since 2005 and the spyware has been considered as the complex program to be spotted eight years ago when detection and instances of such custom-written malware was sparse. For this reason, FBI has announced large prize money of $50,000 for anyone who could bring potential lead to find Carlos Enrique Perez-Melara of ‘Lover Spy’.

Similar to Carlos Enrique Perez-Melara, FBI has also offered the same $50,000 reward to extract information Andrey Nabilevich Taame, a Syrian national been accused of click fraud in 2007 and 2010, Noor Aziz Uddin and Farhan Ul Arshad, who are accused of an international fraud that deceived $50 million from victims.

However, the last reward of $100,000 has been announced for getting information on Russian Aleksey Belan who is involved in raiding customer databases of large U.S. e-commerce firms, detected in April 2013.