Categories » Botnets

Silk Road 2.0 Hit by ‘Sophisticated’ DDoS Attack- 15 September 2014

15 September 2014- CoinDesk Silk Road 2.0 Hit by ‘Sophisticated’ DDoS Attack

Blizzard, PlayStation Network, and More Under Wide DDoS attack- 24 August 2014

24 August 2014- ShackNews Blizzard, PlayStation Network, and more under wide DDoS attack

New Variant of Bugat Malware Borrows Lucrative Gameover Zeus Techniques- 14 August 2014

14 August 2014- IBM Security Intelligence New Variant of Bugat Malware Borrows Lucrative Gameover Zeus Techniques

Windows XPocalypse and the Spread of ATM Malware- 2 April 2014

2 April 2014- Recorded Future Windows XPocalypse and the Spread of ATM Malware

Sefnit botnet-Microsoft has silently uprooted Tor Browser from more than 2 Million PC – January 22, 2014

1/22/2014 – Security Affairs Sefnit botnet-Microsoft has silently uprooted Tor Browser from more than 2 Million PC

Play This Harmless-Looking Web Game, and You’re Helping the Pentagon- 11 December 2013

11 December 2013- Wired Play This Harmless-Looking Web Game, and You’re Helping the Pentagon

Kaspersky Security Bulletin 2013 on Malware Evolution- 3 December 2013

3 December 2013- Securelist Kaspersky Security Bulletin 2013. Malware Evolution

Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset

Amid continuous revelations of a variety of “Advanced Persistent Threat” (APT) hacking operations sponsored by nation states–among them Flame/Gauss/Duqu/Stuxnet, Red October, Comment Crew, Shamoon, Icefog and Dark Seoul– the major global players such as the US, Russia, and China have … Continue reading

The Syrian Electronic Army: Mediums of Disinformatics

“We are just Syrian youths who want to defend their country against the media campaign that is full of lies and fabricated news reports” The Syrian Electronic Army (SEA) most likely began at least in part as an outgrowth of … Continue reading

Successor to Blackhole Exploit Kit May Take Years to Emerge

The arrest of Paunch shut off the flow of updates to the highly popular crimeware infastructure support tool, the Blackhole Kit. Since then there have been a number of contenders for the lucrative crown. A new article at Threatpost speaks … Continue reading

How I Learned to Stop Worrying and Love the Spam

Here at MCySec we receive a decent amount of spam every day, much like anyone who runs a blog with open commenting. All of this spam has been stopped by WordPress and Akismet from being displayed on our pages, This … Continue reading

Red October(?) Evolves, Hits Finnish Foreign Ministry

The Red October RAT (Remote Access Tool) which has been extensively analyzed by Kaspersky appears to have continued its development. The Finnish Foreign Ministry has disclosed that they were the victims of a penetration attack going on over four years. … Continue reading

The Malware of Things

A pair of dueling intelligence exploitation revelations have given the ongoing Snowden releases a run for their money. The first is the allegation that Russia provided poisoned gifts to delegates at the G20 summit. The complementary USB sticks and telephone … Continue reading

Google Rolls Out New “Digital Attack Map” Tool

Google has unveiled a new tool that allows real-time and historical display of digital attack traffic. Foreign Policy has done an excellent write-up on the new tool here. The tool gives you the ability to see ongoing DDOS and scanning … Continue reading

“Paunch” Punches Out, Blackhole Kit Hits the Rocks

The Blackhole Exploit Kit, one of the more popular methods of delivering criminal malware to unsuspecting users, has run into a number of difficulties in the last few days. The leading crimeware kit, which has usually been updated as often … Continue reading

QUANTUM and FOXACID; NSA:TAO MiTMing TOR Users

Bruce Schneier has recently published a series of articles on the ways that the users of the TOR network and others have been targeted with exploits by the NSA’s Tailored Access Operations group. He has also posted a full explanation … Continue reading

Tiny Botnet Makes Big Impact on Background Check Companies, ID Thieves Profit.

Security Researcher Brian Krebs has conducted an investigation of a number of identity theft portals active on the internet, where various ne’er-do-wells were able to purchase the personal information (social security numbers and full background check information) of anyone they … Continue reading