ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Banking malware spies on victims by hijacking webcams, microphones, researchers say

Banking malware spies on victims by hijacking webcams, microphones, researchers say | ICT Security-Sécurité PC et Internet | Scoop.it
A new variant of SpyEye malware allows cybercriminals to monitor potential bank fraud victims by hijacking their webcams and microphones, according to security researchers from antivirus vendor Kaspersky Lab.

 

 

 

 

 

 

Read more:

http://www.computerworld.com/s/article/9227387/Banking_malware_spies_on_victims_by_hijacking_webcams_microphones_researchers_say

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Improved SpyEye variant actively attacking Android devices

Improved SpyEye variant actively attacking Android devices | ICT Security-Sécurité PC et Internet | Scoop.it

The first SpyEye variant, called SPITMO, has been spotted attacking Android devices in the wild.

According to Amit Klein, Trusteer’s chief technology officer, the threat posed by DriodOS/Spitmo has escalated the danger of SpyEye now that this malicious software has been able to shift its delivery and infection methods.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Malware now can spy using web camera. Who still has their cameras unblocked?

Malware now can spy using web camera. Who still has their cameras unblocked? | ICT Security-Sécurité PC et Internet | Scoop.it

Twitter Topic Text from https://twitter.com/#!/e_kaspersky

 

Text from SECURELIST by:

 

Dmitry Tarakanov
Kaspersky Lab Expert
Posted May 21, 14:10 GMT
Tags: SpyEye

 

Malware now can spy using web camera. Who still has their cameras unblocked?

 

It seems that development of the main module of SpyEye stopped with last autumn’s version 1.3.48. But just because the authors are not developing this platform further, it doesn’t mean that SpyEye is no longer getting new functions.

 

This is not the first time that cybercriminals using online banks have tried to get video and audio footage of victims. My colleague Dmitry Bestuzhev recalls a case when a malicious program targeting clients of an Ecuadorian bank also had functionality to record video and audio footage on the infected computer and to send it to intruders.

 

This too was not related to optical client recognition - the Ecuadorian bank had no such feature implemented.

 

It all begs the question – why film your victim? Apparently, cybercriminals watch the user’s reaction when the theft is in process. As usual, money is stolen in the following way: the user types his/her login data into the bank site, but the code of the bank’s page is modified by malware directly in the browser and after authorization the user doesn’t see the bank account but the malware creates a window with a message saying, for example, “Loading... Please wait...”. At the same time, injected malicious code prepares to send the stolen money to an accomplice’s bank account.

 

Once that’s done, in order to confirm the transaction, cybercriminals have to persuade the user to enter a secret code, which could be received by SMS. This is when social engineering is used: the intruder’s program puts a request on the victim’s screen, something like: “We have strengthened security measures. Please confirm your identity entering the secret code we have sent to your phone.”

 

Very interesting, learn more:

http://www.securelist.com/en/blog/208193513/Big_Brother

 

No comment yet.