Cyber-criminals Attack Variety of Victims during January 2012
During January 2012, malware assaults were launched on various kinds of targets like online gamers hunting game crack of Pro Evolution Soccer 2012, SMB (small-and-medium-sized business) proprietors anxious to preserve their business reputation, or agencies of government getting phishing e-mails supposedly from the US-CERT (United States Computer Emergency Readiness Team). MarketWatch published this dated February 8, 2012.
Senior Threat Researcher Chris Boyd at GFI Software commented that anybody surfing on the Net became risked with getting infected or targeted with scams that cyber-criminals unleashed. There could hardly be a distinction between phishers and malware purveyors. Both deliberately spread their attacks wide online while selecting the assault techniques so as to obtain the maximum possible targets. Irrespective of the person being a new online gamer, a government staff or a flourishing businessman, all required being vigilant while following web-links, which apparently associated with the targets' interests, particularly if they were asked for providing their private data online, Boyd cautioned. Help Net Security published this on February 9, 2012.
One more typo-squatting scam that was also launched in January 2012 emanated from the belief regarding users' persistent attempts at accessing the Megaupload website, currently obsolete, for viewing the usual display of the FBI alert. People who missed entering the correct spelling of the website's ULR address ended up having websites, which presented false prizes against the users' sensitive, personal information.
Additionally according to GFI, the majority of the e-threats that aimed at end-users during January 2012 included Trojans with 35% of detections followed with Yontoo Adware (2.23%) along with fake security software the company detected as FraudTool.Win32.FakeRean. There was also the all-pervasive Trojan, Autorun.inf on the list that accounted for some 1.2% of assaults. More malware that GFI discovered, included Trojan.Win32.Ramnit.c (0.94%), Exploit.PDF-JS.Gen (0.86%), GameVance (0.82%), and Trojan.Win32.Jpgiframe (0.77%).
Continuing further Boyd said that although cyber-criminals mightn't be too selective in choosing victims, they certainly weren't haphazard in selecting their techniques. Moreover, the assault process involved knowing everything about the group the criminals desired attacking followed with carrying out all that was necessary for raising their success probability while duping end-users into getting trapped.
Related article: Cyber Child abuser Sentenced To Imprisonment
» SPAMfighter News - 16-02-2012
We are happy to see you are reading our IT Security News.
To reward your interest, we would like to offer you any of our award-winning products
at the price $19.95. Pick your own favorites.