Overview
Last month, a newly effective banking trojan has been
discovered, targeting online banking users. This malware uses very
reliable looking link addresses or domains which are related to trusted
organizations to attract victims into running them. Even though this
trojan has analogous functionality and goals like that of the
ignominious Zeus and SpyEye, its architecture and way of implementation
makes it fall in a new malware family. This banking trojan, regardless
of being a new malware program, emerged as Win32/Spy.Hesperbot.
The main aim of the offender is to obtain credentials giving access to
the victim’s bank account and making them install a mobile component of
the malware on smartphone platforms (Symbian, Android, and Blackberry).
==> Read More
Monday, October 14, 2013
Hesperbot: An Atrocious Banking Trojan

- Syrian Electronic Army hacked President Obama website and social media
- Subcontractors are for hackers the weakest link in security chain
- Brainpan
- Some Cool DIY Raspberry Pi Projects
- Port Scanning using Scapy
- What Is Scapy?
- CSRF Proof of Concept with OWASP ZAP
- BEAST vs. CRIME Attack
- DEF CON 20 Presentations - Video + Slides
- Prolexic on the Distributed Reflection Denial of Service attacks
- Twitter Unrestricted File Upload Vulnerability
- HTTP Request Hijacking - Attack Flow
Subscribe to:
Post Comments (Atom)
Popular Post
Archive Blog
Powered by Blogger.
Category
Adobe
(1)
android
(1)
Application Security
(3)
APT
(1)
Cheat Sheet
(3)
Facebook
(2)
Forensic
(16)
General Security
(7)
google
(1)
Hacking
(28)
Hijacking
(3)
iOS
(1)
Linux
(5)
Linux Command
(1)
Malware
(2)
Mobile Device
(2)
Nmap
(1)
OWASP
(1)
Password
(2)
Research
(2)
Reverse Engineering
(5)
SANS
(1)
Scripts
(1)
Security
(7)
Security Tools
(3)
Social media
(1)
SSL
(1)
SysAdmins
(1)
Twitter
(1)
Video
(8)
Vulnerability
(1)
Wi-Fi
(1)
XSS
(2)
No comments:
Post a Comment