TDL is Targeting Windows PC, Experts are saying that "it is almost indestructible"


More than four million PCs have been enrolled in a botnet security experts say is almost "indestructible". The botnet, known as TDL, targets Windows PCs and is difficult to detect and shut down. targeting
Code that hijacks a PC hides in places security software rarely looks and the botnet is controlled using custom-made encryption.
Security researchers said recent botnet shutdowns had made TDL's controllers harden it against investigation.
The 4.5 million PCs have become victims over the last three months following the appearance of the fourth version of the TDL virus. The changes introduced in TDL-4 made it the "most sophisticated threat today," wrote Kaspersky Labs security researchers Sergey Golovanov and Igor Soumenkov in a detailed analysis of the virus. "The owners of TDL are essentially trying to create an 'indestructible' botnet that is protected against attacks, competitors, and anti-virus companies," wrote the researchers.
Recent successes by security companies and law enforcement against botnets have led to spam levels dropping to about 75% of all e-mail sent, shows analysis by Symantec.
A botnet is a network of computers that have been infected by a virus that allows a hi-tech criminal to use them remotely. Often botnet controllers steal data from victims' PCs or use the machines to send out spam or carry out other attacks.
The TDL virus spreads via booby-trapped websites and infects a machine by exploiting unpatched vulnerabilities. The virus has been found lurking on sites offering porn and pirated movies as well as those that let people store video and image files. The virus installs itself in a system file known as the master boot record. This holds the list of instructions to get a computer started and is a good place to hide because it is rarely scanned by standard anti-virus programs.
The biggest proportion of victims, 28%, are in the US but significant numbers are in India (7%) and the UK (5%). Smaller numbers, 3%, are found in France, Germany and Canada.
However, wrote the researchers, it is the way the botnet operates that makes it so hard to tackle and shut down.
The makers of TDL-4 have cooked up their own encryption system to protect communication between those controlling the botnet. This makes it hard to do any significant analysis of traffic between hijacked PCs and the botnet's controllers.
In addition, TDL-4 sends out instructions to infected machines using a public peer-to-peer network rather than centralised command systems. This foils analysis because it removes the need for command servers that regularly communicate with infected machines.
"For all intents and purposes, [TDL-4] is very tough to remove," said Joe Stewart, director of malware research at Dell SecureWorks to Computerworld. "It's definitely one of the most sophisticated botnets out there."
However, the sophistication of TDL-4 might aid in its downfall, said the Kaspersky researchers who found bugs in the complex code. This let them pry on databases logging how many infections TDL-4 had racked up and was aiding their investigation into its creators.

-News Source (BBC)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

2 Website Hacked By OuT-L4W


2 Websites get Hacked by OuT-L4W

Hacked Sites:- 

http://www.hospohype.com.au/

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Google, Microsoft & Yahoo are looking to buy Hulu


Elisa Schreiber, a spokesman for Hulu was contacted and asked to comment on the subject of the potential sale. She declined to reveal any information regarding the transaction of the company. The spokesmen for the potential buyers, Microsoft, Google and Yahoo!, would not comment on the matter, either. The experts say that if Hulu were to be bought by any of the mentioned companies it would be improved. A new owner could equip it with a better monetary foundation.
Hulu was founded in March 12, 2008 and has its headquarters in Los Angeles, California. Its services cover the area of the United States and its overseas territories. It distributes video on its own website but also on other websites. It also allows its users to embed its videos in their websites. Hulu’s content includes programs from TV channels such as NBC, ABC, FOX, MSNBC, CNBC, MTV, VH1, Nickelodeon and National Geographic Channel, as well as a large number of movies. Since November 2009, Hulu is also distributing music. It signed partnerships with record labels in order to host music videos and concerts. Among the partners, there are EMI (since November 2009) and Warner Music Group (December 2009). Hulu can be followed on TV, on computers, on tablets or on smart phones.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vulnerabilities Fixed in the Apple Developer Website


A vulnerability that could have led to phishing attacks against Mac OS X, iPad and iPad developers has finally been closed, according to the hacker group that flagged up the hole on an Apple development website few days ago. YGN told Apple about the Arbitrary URL Redirect vulnerability and cross-site scripting issue on April 25, warning it could lead to phishing attacks on developers using the website. Apple acknowledged YGN's information on April 27, but didn't fix the hole. That frustrated YGN, which let news reporters know it would go public with the information in a short period of time even if Apple didn't correct the problem. One day after news reports on the situation, Apple fixed the problem.
It was the Vulnerability on Developer  of Apple's Website

Vulnerabilities in developer.apple.com

Vulnerabilities via URL Redirector in developer.apple.com
1. VULNERABILITY DESCRIPTION
Arbitrary URL Redirect
======================


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

URL Shorteners Have been Exploited Malware Writers


URL shorteners (such as bit.ly) have escalated in popularity thanks to services like Twitter where every character counts. However they come at a security cost.
Spammers have been using them to for some time, and anyone who frequents twitter will have seen the pornography industry using them. However Symantec’s Nick Johnston reports on a worrying trend, using them to hide malware using so-called drive-by attacks. He reports on one exploit.
The attack abused at least five different URL shortening sites. The message claimed to be from an inter-bank funds transfer service, claiming that a funds transfer had been cancelled. To find out why the transfer was cancelled, recipients were encouraged to click on a link supposedly pointing to a PDF file, but actually pointing to a shortened URL. This shortened URL then redirects to a site with several drive-by exploits.
A drive-by attack is one that exploits security flaws in browsers and causes them to download and execute malicious code simply by visiting a page. They do not require a user to click on anything or download files. In the example cited, the page exploited holes in PDF documents, Java and a Windows Help Center exploit. Expect more of this, warns Symantec.
We saw hundreds of unique shortened URLs being used to link to this malware, and expect to see malware authors using this technique in future.
There are browser plug-ins for Firefox and Chrome that will expand shortened URLs so you can see the destination site before clicking on the link. It is expected that

To See the Symantec Report Click HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Fox News Politics Twitter Account Hacked & claims Obama shot in Iowa


Fox News Politics Twitter Account Hacked By The Script Kiddies. The Hacker spread a rumour that  

"Barack Obama has just passed. Neraly 45 Minutes ago. he shots twice in the lower pelvic area and in the neck; shooter unknown bled out."  

He also changed the description of the twitter from its original to  

"H4CK3D BY TH3 5CR1PT K1DD3S"



Later Fox News released a statement confirming the hacking and adding that "the hacking is being investigated, and FoxNews.com regrets any distress the false tweets may have created."

To See the statement Click HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Web hosting & Dedicated Server Provider's Official Website Hacked By C7


A Web Hosting Company (Agreatwebhost) & Dedecated-Servers-Provider (Dedicated-Services-Host) official website, Where About 18,000 Websites Were Hosted, Hacked And Owned By [c7 assassin]

Hacked Sites:- 


Mirror Links:-

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...