• Category Archives Virus Threats
  • New emerging viruses and spyware loose in the net and identification of diffrent type of malware

  • New Zero Day Vulnerability Found In Internet Explorer All versions


    A new zero-day vulnerability that resides in all versions of Internet Explorer has been spotted in the wild, Microsoft confirmed late Saturday.

    The vulnerability, which could allow remote code execution, is being used in “limited, targeted attacks,” according to an advisory issued by Microsoft. While all versions of the web browser, IE 6 through 11, are affected by the vulnerability, attacks are currently targeting IE versions 9, 10 and 11, according to security firm FireEye, which first reported the flaw Friday.

    The attack leverages a previously unknown “use after free” vulnerability — data corruption that occurs after memory has been released — and bypasses both Windows DEP (data execution prevention) and ASLR (address space layout randomization) protections, according to FireEye.

    The vulnerability is currently being exploited by a group of hackers targeting financial and defense organization in the US, FireEye told CNET.

    “The APT [advanced persistent threat] group responsible for this exploit has been the first group to have access to a select number of browser-based 0-day exploits (e.g. IE, Firefox, and Flash) in the past,” FireEye said. “They are extremely proficient at lateral movement and are difficult to track, as they typically do not reuse command and control infrastructure.”

    FireEye said the flaw was significant because it affects more than a quarter of the total browser market.

    “Collectively, in 2013, the vulnerable versions of IE accounted for 26.25% of the browser market,” FireEye said in its advisory.

    An attack could be triggered by luring visitors to a specially crafted web page, Microsoft explained.

    “The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated,” Microsoft said. “The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer.”

    Microsoft said it is investigating the vulnerability and may issue an out-of-cycle security update to address the issue.

    Please visit ccrepairservices.com

    for latest computer repair and online news.

    Local and Online Virus removal and computer repairs anytime, anywhere



  • Linux Worm targets Internet-enabled Home appliances to mine Cryptocurrencies

    Could a perfectly innocent looking device like router, TV set-top box or security cameras can mine Bitcoins? YES! Hackers will not going to spare the Smart Internet-enabled devices.

     

    A Linux worm named Linux.Darlloz, earlier used to target Internet of Things (IoT) devices, i.e. Home Routers, Set-top boxes, Security Cameras, printers and Industrial control systems; now have been upgraded to mine Crypto Currencies like Bitcoin.

    Security Researcher at Antivirus firm Symantec spotted the Darlloz Linux worm back in November and they have spotted the latest variant of the worm in mid-January this year.

    Linux.Darlloz worm exploits a PHP vulnerability (CVE-2012-1823) to propagate and is capable to infect devices those run Linux on Intel’s x86 chip architecture and other embedded device architectures such as PPC, MIPS and MIPSEL.

    The latest variant of Linux.Darlloz equipped with an open source crypto currency mining tool called ‘cpuminer’, could be used to mine Mincoins, Dogecoins or Bitcoins.

    Symantec Researchers scanned the entire address space of the Internet and found 31,716 devices infected with Darlloz. “By the end of February 2014, the attacker mined 42,438 Dogecoins (approximately US$46 at the time of writing) and 282 Mincoins (approximately US$150 at the time of writing). These amounts are relatively low for the average cybercrime activity so, we expect the attacker to continue to evolve their threat for increased monetization.” Kaoru Hayashi, senior development manager and threat analyst with Symantec in Japan.

    Major infected countries are China, the U.S., South Korea, Taiwan and India.

    Darlloz hack malware

    Crypto Currency typically requires more memory and a powerful CPUs, so the malware could be updated to target other IoT devices in the future, such as home automation devices and wearable technology.A Few weeks back, Cisco has announced a global and industry-wide initiative to bring the Security community and Researchers together to contribute in securing the Internet of Things (IoT) and launched a contest called the “Internet of Things Grand Security Challenge“, offering prizes of up to $300,000 for winners.

    Users are advised to update firmware and apply security patches for all software installed on computers or Internet-enabled devices. Make sure, you are not using default username or password for all devices and block port 23 or 80 from outside if not required.

    Please visit ccrepairservices.com

    for latest computer repair and online news.

    Local and Online Virus removal and computer repairs anytime, anywhere


  • Facebook ‘Watch naked video of friends’ Malware scam infects 2 million users

    Facebook Watch naked video of friends

    We have seen a lot of Facebook malware and virus infections spreading through friends list, and this time a new clickjacking scam campaign is going viral on Facebook.

    Hackers spam Facebook timeline with a friend’s picture and “See (Friend)’s naked video,” or “(Friend Name’s) Private Video.”

    The Picture appears to be uploaded by a friend and definitely, you might want to see some of your Facebook friends naked, But Beware! If you get curious and click, you will be redirected to a malicious website reports that your Flash Player is not working properly and needs to be re-installed.

    But in actuality it will install a malware in your system and once approved, several disguised thing can happen to you. It further installs a malicious browser extension to spread the scam and steal users’ photos.

    Facebook 'Watch naked video of friends' malware scam infects 2 million people

    When the link is clicked, users are sent to a very realistic-looking mockup of a YouTube page, where the hackers will try to immediately install the Malware Trojan.” 

    So, Don’t Click it! According to the report, 2 million Facebook users are already infected with the same malware campaign and unknowingly flood their friend’s timeline will same campaign. Clicking on the message will automatically publish the same link on the victims Facebook wall potentially allowing friends to click on it.

    Malware often takes advantage of the fact that you trust your friends. So, keep an eye on the links and messages from your friends, and if in doubt, ask them they actually sent you something or not.

    The recent malware attacks are just a few examples of the dangers of using the social network Facebook. Stay safe by keeping your browser up-to-date and install operating system updates when they are released. Please ensure you share this news with your Facebook friends to make all of them aware of it.

     

    Complete Online Computer news and Repair

    WWW.CCREPAIRSERVICES.COM


  • Uroburos Rootkit – Most sophisticated 3 year old Russian Cyber Espionage Campaign

    The Continuous Growth of spyware, their existence, and the criminals who produce & spread them are increasing tremendously. It’s difficult to recognize spyware as it is becoming more complex and sophisticated with time, so is spreading most rapidly as an Internet threat.

    Recently, The security researchers have unearthed a very complex and sophisticated piece of malware that was designed to steal confidential data and has ability able to capture network traffic.

    The Researchers at the German security company G Data Software, refer the malware as Uroburos, named after an ancient symbol depicting a serpent or dragon eating its own tail, and in correspondence with a string (Ur0bUr()sGotyOu#) lurking deep in the malware’s code.

    The researchers claimed that the malware may have been active for as long as three years before being discovered and appears to have been created by Russian developers.

    Uroburos is a rootkit designed to steal data from secure facilities, has ability to take control of an infected machine, execute arbitrary commands and hide system activities, communicating primarily using peer-to-peer connections in a network it has penetrated to infect new machines within the network, manages to pass back the exfiltrated information back to attackers from infected machines and network data, the researchers explained.

    The two main components of Uroburos are – a driver and an encrypted virtual file system, used to disguise its nasty activities and to try to avoid detection. Its driver part is extremely complex and is designed to be very discrete and very difficult to identify.

    The malware uses two virtual file systems, one NTFS file system and one FAT file system, and both are stored locally on the infected system and are used as a “workspace” by the attackers, providing a storage space for third-party tools, post-exploitation tools, temporary files and binary output. The virtual file system can’t be decrypted without the presence of drivers, according to the Gdata’s analysis explained in the PDF.

    The driver is needed to decrypt the virtual file systems, to create several hooks to hide its activities, to inject libraries in the users land and to establish and manage some communication channels.

    “The development of a framework like Uroburos is a huge investment. The development team behind this malware obviously comprises highly skilled computer experts, as you can infer from the structure and the advanced design of the rootkit. We believe that the team behind Uroburos has continued working on even more advanced variants, which are still to be discovered.”

    WITH LOVE From RUSSIA: Technical Similarities with the previous malware Agent.BTZ and that the malware Uroburos checks the presence of Agent.BTZ in the system and remains inactive if Agent.BTZ is present, makes the researchers believe that it was designed by the same by the Russian intelligence services, according to G Data analysis.

    “Due to many technical details (file name, encryption keys, behavior and more details mentioned in this report), we assume that the group behind Uroburos is the same group that performed a cyberattack against the United States of America in 2008 with a malware called Agent.BTZ,” say the researchers. They also added that the reason it is meant to be of the Russian origin is, “Uroburos checks for the presence of Agent.BTZ and remains inactive if it is installed. It appears that the authors of Uroburos speak Russian (the language appears in a sample), which corroborates the relation to Agent.BTZ. Furthermore, according to public newspaper articles, this fact, the usage of Russian, also applied for the authors of Agent.BTZ.”

    In 2008, USB and Removable storage drives placed on hold in the U.S. Army facilities after the spread of Agent.BTZ worm. The USB stick contained malicious code was trying to keep on multiplying further and infected the military’s network.

    The attacks carried out with Uroburos are targeting government institutions, research institutions, intelligence agencies, nation states, research institutions or companies dealing with sensitive information as well as similar high-profile targets. The oldest drivers identified by the researchers was compiled in 2011 is the evidence that the malware was created around three years ago and was undetected.

    “The Uroburos rootkit is one of the most advanced rootkits we have ever analyzed in this Environment,” the G Data concluded.

    The team behind the development of the malware Uroburos has developed an even more sophisticated framework, which still remains undiscovered, the researchers believe. Many infection vectors are conceivable. E.g. Spear phishing, drive-by-infections, USB sticks, or social engineering attacks.

    For complete Online Latest news visit our blog

    WWW.CCREPAIRSERVICES.COM


  • Android iBanking Trojan Source Code LEAKED ONLINE

    Smartphone is the need of everyone today and so the first target of most of the Cyber Criminals. Malware authors are getting to know their market and are changing their way of operations. Since last year we have seen a rise in the number of hackers moving from the Blackhat into the Greyhat.

     

    iBanking, a new mobile banking Trojan app which impersonates itself as an Android ‘Security App‘, in order to deceive its victims, may intimidate a large number of users as now that its source code has been leaked online through an underground forum.

    It will give an opportunity to a larger number of cybercriminals to launch attacks using this kind of ready-made mobile malware in the future.

     

    Since many banking sites use two-factor authentication and transaction authorization systems in order to deal with the various threats, by sending unique one-time-use codes to their customers’ registered phone numbers via SMS, but in order to defraud them, cyber criminals have started to create various mobile malware like iBanking to solve their purpose.

     In addition, with the iBanking malware, Computer malware is used to defeat the mobile-based security mechanisms used by the banking sites.

    Apart from the server-side source-code, the leaked files also include a builder that can un-pack the existing iBanking APK file and re-pack it with different configurations, essentially providing fraudsters with the means to create their own unique application,” added Daniel Cohen.

    In addition to SMS Sniffing, the iBanking app allows an attacker to redirect calls to any pre-defined phone number, capture audio using the device’s microphone and steal other confidential data like call history log and the phone book contacts.

    During the installation process, the malicious app attempts to Social Engineer the user into providing it with administrative rights, making its removal much more difficult.

    Latest Computer news and virus and malware threats at Complete computer Repair Services Fort Lauderdale and all South Florida Latest Computer News and Repair Services

    www.ccrepairservices.com


  • AC Laptop Power and Battery Charger Adapter Cord

    Laptop Charger Power Cord Adapter for sale Battery keyboard mouse dvd or cd drive burner ram memory and hard drive Ide or Sata disk drive

    lcd screen webcam usb stick wireless internet lan card wifi card bluetooth card & more.

    TravelMate, Extensa, Ferrari, Aspire

    MacBook, MacBook Air, MacBook Pro

    Asus Eee, Lamborghini

    Inspiron, Latitude, Precision, Studio, Vostro, XPS, Studio XPS, Alienware Mini Legacy System Adamo

    Fujitsu – LifeBook, Stylistic

    Hewlett-Packard – HP Pavilion, HP Omnibook Envy EliteBook ProBook

    ThinkPad, IdeaPad, 3000

    Micro-Star International (MSI) – Megabook, Wind

    Electronics – Sens

    VAIO Series

    eMachines – Gateway – Solo – Series Compaq

    dynabook, Portege, Tecra, Satellite, Qosmio, Libretto

    ORIGINAL COMPUTER MANUFACTURER PARTS : DELL SONY HP ACER AUS SAMSUNG ASUS LENOVO COMPAQ TOSHIBA IBM THINKPAD NOTEBOOK NETBOOK & Desktop Power supply

    CALL – 754-234-5598

    www.ccrepairservices.com

    Serving all Broward and Miami Dade County All Broward County Service Area Coconut Creek Cooper City Coral Springs Dania Beach Deerfield Beach Fort Lauderdale Hallandale Beach Hollywood Lauderdale Lakes Lauderhill Lighthouse Point Margate Miramar North Lauderdale Oakland Park Parkland Pembroke Pines Plantation Pompano Beach Sunrise Tamarac Westpark Weston Wilton Manors Hollywood Hills Miami Hialeah Opalocka Miami Springs North Miami Beach Sunny Isles Golden Beach South Beach and more.

    1150 1150 3000 400L 630m 6400 700M 8000 8100 9300 WXA 9400/E1705 C400 C400 C540/C640 C600 C640 400xt CPid266XT CPiA 366 CPt CPx CSx d500 d600 d610 d620 d630 d800 d830 1525 1000 1100 1300 1501 1545 1720 2200 2500 2650 3500 4000 4100 4150 5000 5000e 5100 510m 5150 5150 5160 6000 6000 600m 6400 7000 700m 7500 8000 8100 8200 8500 8600 8600c 9100 9200 9300 B120 N5110 XPS e1505 L400 110L 120L C510 C600 C610 C640 C800 C840 CP D400 D410 D420 D505 D510 D531 D600 D620 D800 D810 D820 E6400 LM LS X1 X200 XPid610 M4400 M4500 M6300 M6400 M65 M70 M90 SmartPC 250 Studio 1555 1700 MS2103 1000 1400 1500 1700 X200 17 1730 M1210 M1710 b120 100 1100 640md430 M60 x300 xps m1330 534LC 528 507DX 535LC 530 510DX 540LMI 530XVI 521TE 541XCI 531XCI 522TX 543LCI 533XC 525TE 551XV 505T 534LCI 528TE 507T 535LCI 530LC 510T 541 531 521TEV 541XV 531XV 524 543LMI 533XCI 525TX 506 534TL 529 508DX 536 530LCI 520 541LC 521TX 542 531XVI 524TE 550 500 533XV 525TXV 553 506DX 534XC 529ATXV 508T 536LCI 530XC 520IT 541LCI 531LC 521TXV 542LCI 533 524TX 551 509 533XVI 527 506T 534XCI 5000 5005WLMI 5053NWXMI 5001LMI 5002WLCI 5004 5030 5053WXMI 5000 5002 5002WLM 5004WLCI 5040 5000WLMI 5002LC 5002WLMI 5004WLMI 5051AWXC 5052AWXMI 5051AWXMI 5001 5002LCI 5003 5005 5052ANWXMI 5001LCI 5002LM 5003WLCI 5005WLCI 5052NWXMI 5001LM 5002LMI 5003WLMI 5100 5102 5112WLMI 5100 5102WLMI 5113WLMI 5101 5103WLMI 5114WLMI 5102WLCI 5110 5102AWLMIP 5115WLMI 5101AWLMI 5103WLMIP 5300 5320-101G12MI 5320-101G16MI 5313WLMI 5320-201G16MI 5320-202G16MI 5310 5320-2518 5320 5330 5320-051G16MI 5315 5400 5410T 5410 5500 5520-6A2G12MI 5515WLMI 5520G-602G25 5520-401G12MI 5502 5520-5134 5510 5514 5520G-402G16 5520-5568 5560 5530 5520-6A2G16MI 5520-401G16 5503 5520-5283 5515 5540 5520-5678 5561AWXMI 5520-7A2G16MI 5520-402G16MI 5504 5520-5308 5541ANWXMI 5520G 5520-5762 5562WXMI 5520-501G12MI 5520-5313 5520 5542ANWXMI 5520-5929 5563WXMI 5520G-402G16MI 5500 5520-501G16MI 5512 5520-5A1G12MI 5520-5421 5550 5520-6A1G08MI 5520G-502G25MI 5520-401G12 5501 5520-502G16MI 5513 5520-6A1G16MI 5520-5424 5552NWXMI 5600 5633WLMI 5683WLMI 5620G-1A2G25MI 5620 5650 5684WLMI 5620Z 5623WSMI 5670 5620Z-1A2G16MI 5624WSMI 5672WLMI 5620-1A1G12 5632WLMI 5680 5620-1A2G25MI 5634WLMI 5680 3G 5620G 5600 5700 5720-301G16MI 5730 5720G-102G16 5720G-302G20 5720-101G12 5720-302G16MN 5720G-102G20 5720G-302G20N 5720-101G16 5720-6564 5720G-301G16 5720G-602G16MI 5710G 5720-101G16MI 5720-6623 5720G-301G16MI 5720G-602G25N 5710-101G12 5720G 5710 5720-101G16N 5720G-101G16 5720G-302G16 5720G-F3MI 5710-101G12MI 5720 5720-301G16 5720G-101G16N 5720G-302G16MI 5710-101G16 5800 5810TG 5810T 600 600 613 614TXVCI 600TER 603TER-98 610TXVI 611TXV 613TXC 600TER-128 604 610TXVI-ME 612 613TXV 602 604TER 611 612TXC 614 602TER 610 611TXC 612TXCI 614TXCI 603 610TXC 611TXCI 612TXV 614TXV 603TER 610TXV 611TXCI-D 6000 6003LCI 6000 6003LMI 6001 6004 6002 6004L 6002LCI 6004LC 6003 6004LMI 6200 6292 6293 6400 6463LMI 6465WLMIB 6463WLMI 6492 6410 6463WLMIB 6493 6413LMI 6464WLMI 6414LMI 6464WLMIB 6460 6465WLMI 6500 6592 6593G 6593 6592G 6590 700 722ITXV 710TE 741 730 732TX 735 737 720X 700 7 39GTLC 722TX 711 741LVF 730TE 732TXV 735TLV 737TLV 721 700T 739GTLV 722TXNT 711TE 744 730TX 734 735TXV 738 721TX 710 739TLV 723 712 744LCF 730TXV 734TL 736 720 738TLV 722 710DX 740 723TX 712TE 732 734TX 736TL 720TX 738TLV-9 722ITX 710T 740LVF 723TXV 732TLV 734TXV 736TLV 720TXV 739 7100 7104WSMI 7110 7112WSMI 7300 7320 7320-101G12 7500 7514WSMI 7530 7520-5594 7520-7A2G16MI 7520 -401G16MI 7520G-502G16 7520G-502G25 7520-301G16 7520 7520-5A1G16MI 7520-7A2G25MI 7520-402G16MI 7520G-502G25MI 7520-401G16 7520-6A1G12MI 7520G 7520-501G16MI 7520G-502G32MI 7520-402G16 7520-6A2G16MI 7520G-402G16 7520-6A1G16 7520G-730G50 7510 7520 -502G16MI 7520-6A2G25MI 7520G-402G16MI 7512AWSMI 7520-502G25MN 7520-7A1G12MI 7520G-402G25MI 7520G-502G20 7700 7730 7720 7720G 8000 8002LCIB 8004LMI 8006LMI 8003 8004LMIB 8003LCI 8005 8000 8003LMI 8005LMI 8002 8003LMIB 8005LMIB 8002LCI 8004 8006 8100 8104 8104AWLMI 8100 8104WLMI 8100S 8103 8103WLMI 8200 8210 900 950 950C 9104LM 9112WLMI 9100WLMI 9104LMI 9114WLMI 9101 9104WLMI 9103 9105 9103WLMI 9105WLMI 9104 9110 9210 9303WSMI 9304 9301 9301WSMI 9424AWSMI 9420 9424WSM 9420WSMI 9424WSMI 9422WSMI 9423WSM 9423WSMI 9500 9501WLMI 9504WSMI 9502WLMI 9502WSMI 9503EWSMI 9500 9503WLMI 9500WSMI 9503WSMI C100 C102T C110 C111TCIB C102TCI C110TCI C111TI C102TI C110TI C104 C111 C100 C104CTI C111CTI C102 C104TI C111TCI C200 C204TMI C215TMI C210 C200 C213TMI C203 C203ETCI C204 C300 C302XMI C303XMI C311XMI C313XMI C300XMI C302XMI 11G C310 C312 C314 C301XCI C302XMIB C310XCI C312XCI C314XCI C301XCI-G C302XMI-G C310XMI C312XMI C314XMI C300 C302 C303 C311 C313 C300XCI C302XCI C303XCI C311XCI C313XCI C300XCI 11G MS G60 2230s 2510p 2710p 6830s 6910p nc6400 NX7400 dv5t dv5z dv7t dv7z dv4000 dv4100 dv4200 dv4400 dv5000 dv5000t dv5000z dv5100 dv5117cl dv5117ca dv5021ea dv5057ea dv5098ea dv5200 dv6002xx dv6003xx dv6004ea dv6005ea dv6006ea dv6007ea dv6010ea dv6011ea dv6021ea dv6226 dv6500 dv6700 dv8000 dv8200 dv8300 dv9000 TX2500 CQ40 CQ50 V2000 V3000 V4000 V5000 V5002EA V5004EA V5009EA V5015US V5030EA V5054EA V5059EA V5094EA V6000 M-2623u M-2624u M-2625u M-2626u 200ARC 200STM S-7110M S-7125C S-7200C S-7200N S-7210M S-7220M S-7225C S-7235C S-7235R S-7310M S-7320M S-7410M S-7500N S-7510N S-7700N S-7710N 400SD4 400VTX M-6205m M-6206m M-6207m M-6305 M-6307 M-6308 M-6309 M-6312 M-6315 M-6316 M-6317 M-6318 M-6319 M-6320 M-6322 M-6323 M-6324 M-6325 M-6332 M-6333 M-6334 M-6335 M-6337 M-6339u M-6340u M-6750 M-6752 M-6755 M-6815 M-6816 M-6817 M-6822 M-6823 M-6823a M-6824 M-6827 M-6834 M-6841 M-6843 M-6844 M-6846 M-6847 M-6848 M-6849 M-6850 FX M-6851 M-6862 M-6864 FX M-6866 M-6867 M-6873h M-6874h M-6875b M-6876b M-6877b M-6878 M-6880 M-6881 M-6884h M-6885u M-6887u M-6888h M-6888u M-6889u 600YG2 600YGR MC7310u MC7321u T-1616 T-1620 T-1621 T-1622 T-1623 T-1625 T-1628 T-1629 T-1630 T-1631 M-7301h M-7301u M-7305u M-7309h M-7315u M-7317u M-7325u M-7328u M-7332h M-7333u M-7334u M-7343u M-7347u M-7349u M-7350u M-7351u M-7354u M-7356u M-7818u M-7844u MX3042 MX3044 MX3044h MX3210 MX3212 MX3215 MX3216 MX3225 MX3228 MX3228h MX3230 MX3230h MX3231 MX3410 MX3410h MX3412 MX3412h MX3414 MX3416 MX3417 MX3422 MX3558 MX3558h MX3560 X3560h MX3562 MX3563 MX3563h MX3610 MX3701 MX3702 M675 M680 M685-E M685-G MP8708 MP8709 EC13 EC14 EC1403e EC1405e EC1406e EC1407e EC1409e EC1410u EC1417h EC1430u EC1433u EC1435u EC1436u EC1437u EC1440u EC1454u EC1455u EC1456u EC1457u EC1458u EC14D EC18 EC1803h EC1803u EC1805u EC1814u EC1815u EC19C EC19c08u EC19c09u EC19c10u EC38 EC3803c EC54 EC5409u EC5412u EC58 EC5801u EC5802u EC5809u EC5810u EC5811u M305CRV M320 M325 M350WVN M360 M360A M360B M360C M500 M505 M520 W3501 A505 A355D L305-S5873 L305-S5876 M305-S4826 P305-S8838 U405-ST550W L350-S1001V M300-EZ1001V T110 T130 U400 U500 M2105 M2305 M2350 M2352 M2356 M5105 M5116 M5118 M5305 M5309 M5310 M5312 M5313 M5405 M5410 M5414 M6410 M6412 M6414 M6805 M6807 M6809 M6810 M6811 D440 D520 D525 D620 D640 D720 D725 D727 D730 E440 E520 E525 E527 E528 E529 E620 E625 E627 E630 E720 E725 E727 E730 G525 G625 G630 G725 W4605 W4620 MX4624 MX4625 W4630 N10 N12 N14 NetBook eM250 NetBook eM350

  • NEW VIRUS ALERT ->Careto malware is frighteningly sophisticated

    The software, dubbed Careto, is a sophisticated suite of tools for compromising computers and collecting a wealth of information from them. Whoever is behind the malware sends out “spear phishing” e-mails, with addresses designed to be mistaken for the Web sites of mainstream newspapers, such as The Washington Post or the Guardian. If the user clicks on a link, it takes her to a Web site that scans her system for vulnerabilities and attempts to infect it. There are multiple versions of the malicious software designed to attack Windows, Mac OS X and Linux versions, and Kapersky believes there may be versions that attack iOS and Android.

    Once Careto has compromised a system, it begins collecting sensitive information from it. The software can “intercept network traffic, keystrokes, Skype conversations, analyse WiFi traffic, PGP keys, fetch all information from Nokia devices, screen captures and monitor all file operations.”

    CALL – COMPUTER REPAIR at 754-234-5598 if you are infected by any of these viruses.

    www.ccrepairservices.com


  • Bredo Banking Malware Campaign Targets Bank of America Customers

    Last month the researchers at AppRiver has noticed enormous volumes of traffic through their data centers, with the peaks of traffic reaching three or four times than their normal network traffic.

    They caught and blocked a malware campaign that was using the new and novel tactics designed specifically to beat the filtering engines.

    Last Wednesday the company experienced huge spam traffic i.e. 10 to 12 times the normal amount of their normal routine traffic. “These spikes have been driven by a tremendous increase in the number of incoming messages being sent with viruses attached.” and some user experienced delays in sending and receiving mail.

    They found the malware campaign, distributing a Financial Trojan designed to target, the Bank of America customers, known as ‘Bredo virus’, capable of stealing information such as Credit Card Numbers, Banking credentials, user’s keystrokes.

    AppRiver said that ‘The software may also have abilities to further infect a system by downloading more malware on to the machine’ and added that, ‘running through a variety of virus scanners showed that only 11 of 51 antivirus vendors were classifying it as malware.’

    The Bredo botnet was first detected in May 2009 and is capable of propagating through malicious e-mails that includes malware attachments which would infect a computer when opened, effectively turning the computer into another zombie controlled by the botnet.

    In October 2010, the Dutch law enforcement agents seized 143 LeaseWeb servers used as command & the control center of botnet, but were not able to successfully vanish it completely.

    COMPUTER REPAIR and Online Virus Removal 754-234-5598

    www.ccrepairservices.com


  • NEW VIRUS – Windows Safety Master Virus Windows PC Computers

    Windows Safety Master is a rogue anti-spyware program from the Rogue.FakeVimes family of computer infections. This program is considered scareware because it displays fake scan results, fake security warnings, and does not allow you to run programs on your computer. Windows Safety Master is distributed through web sites that display a fake online virus scanner that states your computer is infected and then prompts you to download the installation file. This infection is also promoted by hacked web sites that contain exploit code that tries to install the infection on your computer without your permission or knowledge.

    When Windows Safety Master is installed it will be configured to automatically start when you login to Windows. Once started, it will pretend to scan your computer and then states that there are numerous infections present. If you attempt to remove any of these supposed infections, the program will state that you first need to purchase a license before being allowed to do so. As all of the scan results are false, please ignore any prompts to purchase the program.

    Windows Safety Master screen shot

     

    To protect itself from being removed, Windows Safety Master will also block you from running any legitimate application on your computer. It does this to prevent you from running legitimate security software that may detect it as an infection and remove it. The message that you will see when you attempt to run a program is:

    Firewall has blocked a program from accessing the Internet
    C:\Program Files\Internet Explorer\iexplore.exe
    is suspected to have infected your PC.
    This type of virus intercepts entered data and transmits them
    to a remote server.

    When you see this message please ignore it as your programs are not infected and will work normally after this infection is removed.

    While Windows Safety Master is running it will also display fake security alerts that are designed to make you think your computer has a severe security problem. Some of these warnings include:

    Error
    Trojan activity detected. System integrity at risk.
    Full system scan is highly recommended.

    Error
    System data security is at risk!
    To prevent potential PC errors, run a full system scan.

    Warning! Identity theft attempt detected
    Hidden connection IP: xx.xxx.xxx.xxx
    Target: Microsoft Corporation keys
    Your IP: 127.0.0.1

    Just like the scan results, these warnings are fake and can be ignored.

    As you can see, this infection was created for the sole reason of scaring you into purchasing it. It goes without saying that you should definitely not purchase Windows Safety Master, and if you already have, please contact your credit card company and dispute the charges stating that the program is a scam and a computer virus. To remove Windows Safety Master and other related malware, PLEASE VISIT OUR WEBSITE

    CALL – COMPUTER REPAIR at 754-234-5598 if you are infected by any of these viruses.

    www.ccrepairservices.com


  • LiveSupport Un-wanted Program

    The LiveSupport program is a small program that displays contact information for a remote support company and suggests that you download a variety of security programs to protect your computer. This program is commonly bundled with free programs that you can download off of the Internet. These free programs bundle adware programs like LiveSupport in order to generate revenue even though the program you wanted is free. Once installed, Live Support will automatically start when you login to Windows and display an icon of a remote-support person’s head on the title bar of the active Window. When you click on this head icon, you will be shown a screen that offers a remote support number, which is currently 1-855-544-6024, as well as a tab that pretends to perform a system check and recommends two of four programs. The programs it promotes are Driver Pro, Optimizer Pro, Driver Updater, and System Performance Optimizer.

     


    LiveSupport screen shot

     

    It is important to note that even though some may find this program to be misleading and annoying, it is not an actual computer infection. Rather this program is installed by free programs that did not adequately disclose that other software would be installed along with it. Therefore, it is important that you pay attention to the license agreements and installation screens when installing anything off of the Internet. If an installation screen offers you Custom or Advanced installation options, it is a good idea to select these as they will typically disclose what other 3rd party software will also be installed. Furthermore, If the license agreement or installation screens state that they are going to install a toolbar or other unwanted adware, it is advised that you cancel the install and not use the free software.

    This program does contain an uninstall entry within the Add or Remove Programs or Uninstall Programs control panel. Unfortunately, there have been many cases where the program did not fully remove itself when using the control panel or it encountered errors. For this reason you may contact Complete Computer Repair Services at 754-234-5598 or Visit our Online Website www.ccrepairservices.com


  • First ever Windows Malware that can hack your android Phone or Device

    Hey Android users! I am quite sure that you must be syncing your Smartphone with your PCs for transferring files and generating backup of your device.

    If your system is running a windows operating system, then it’s a bad news for you. Researchers have discovered a new piece of windows malware that attempts to install mobile banking malware on Android devices while syncing.

    Last year in the month of February, Kaspersky Lab revealed an Android malware that could infect your computer when connected to Smartphone or tablets.

    Recently, Researchers at Symantec antivirus firm discovered another interesting windows malware called ‘Trojan.Droidpak’, that drops a malicious DLL in the computer system and then downloads a configuration file from the following remote server:

    The Windows Trojan then parses this configuration file and download a malicious APK (an Android application) from the following location on the infected computer.

    %Windir%\CrainingApkConfig\AV-cdk.apk

    To communicate with the mobile device a command line tool Android Debug Bridge (ADB) is required, that allows the malware to execute commands on Android devices connected to the infected computer. ADB is a legitimate tool and part of the official Android software development kit (SDK).

    In the next step, the trojan downloads all the necessary tools including Android Debug Bridge and the moment you connect an android device having USB debugging Mode enabled, it initiates the installation process and repeats it until it ensure that the connected device has been infected and install an app that will appear as a fake Google App Store.

    Such Windows Malware is first of its own kind, since attackers prefer to use the social engineering techniques to spread their fake malicious apps hosted on third-party app stores. The installed malware dubbed as “Android.Fakebank.B“, able to intercept victim’s SMS messages and then send them to the attacker’s server located at:

    Anyway Relax, if you are not a Korean citizen, because the malicious APK actually looks for certain Korean online banking applications on the compromised device.

    If you want to protect your Mobile and system from such Malware attack, Please consider a few points while connecting to a windows based computer:

    • Turn off USB debugging on your Android device, when you are not using it
    • Avoid connecting your droid with public computers
    • Only Install reputable security software
    • Keep your System, Softwares and Antivirus up-to-date.

    COMPLETE COMPUTER REPAIR at 754-234-5598

    www.ccrepairservices.com


  • Windows Efficiency Kit Virus

    Windows Efficiency Kit is a rogue anti-spyware program from the Rogue.FakeVimes family of computer infections. This program is considered scareware because it displays false scan results, fake security warnings, and does not allow you to access your legitimate Windows applications. Windows Efficiency Kit is distributed through web sites that display a fake online virus scanner that states your computer is infected and then prompts you to download the installation file. This infection is also promoted by hacked web sites that contain exploit code that tries to install the infection on your computer without your permission or knowledge.

    Once Windows Efficiency Kit is installed it will be configured to automatically start when you login to Windows. Once started, it will pretend to scan your computer and then states that there are numerous infections present. If you attempt to remove any of these supposed infections, the program will state that you first need to purchase a license before being allowed to do so. As all of the scan results are false, please ignore any prompts to purchase the program.

    Windows Efficiency Kit screen shot

    To protect itself from being removed, Windows Efficiency Kit will also block you from running any legitimate application on your computer. It does this to prevent you from running legitimate security software that may detect it as an infection and remove it. The message that you will see when you attempt to run a program is:

    Firewall has blocked a program from accessing the Internet

    Internet Explorer
    C:\Program Files\Internet Explorer\iexplore.exe

    is suspected to have infected your PC.
    This type of virus intercepts entered data and transmits them
    to a remote server.

    When you see this message please ignore it as your programs are not infected and will work normally after this infection is removed.

    While Windows Efficiency Kit is running it will also display fake security alerts that are designed to make you think your computer has a severe security problem. Some of these warnings include:

    Error
    There’s a suspicious software running on your PC. For more details, run a system file check.

    Error
    Trojan activity detected. System data security is at risk. It is recommended to activate protection and run a fully system scan.

    Just like the scan results, these warnings are fake and can be ignored.

    Without a doubt, this infection was created for the sole reason of scaring you into purchasing it. It goes without saying that you should definitely not purchase Windows Efficiency Kit, and if you already have, please contact your credit card company and dispute the charges stating that the program is a scam and a computer virus. To remove Windows Efficiency Kit and other related malware, PLEASE VISIT OUR WEBSITE

    CALL – COMPUTER REPAIR at 754-234-5598 if you are infected by any of these viruses.

    www.ccrepairservices.com