Sunday, April 6th, 2008
As Chris mentioned in a previous post we used social engineering and phishing emails as an attack vector. The scope of the engagement prevented us from collecting any data that could be used to identify the user. The client was not out to make examples of their staff but to ...
Posted in Coding, Internet, Privacy, Security | No Comments
Saturday, April 5th, 2008
This afternoon, we got a highly customized email purporting to come from the IRS, which of course, does nothing more than load malware.
The email is made out to a key financial contact here at Sunbelt (name obfuscated for this post).
As you can see, it’s quite convincing. (Incidentally, “Sunbelt Software Distribution, ...
Posted in Internet, Privacy, Security | No Comments
Monday, March 31st, 2008
A wave of April Fool's Day related Storm mails have just been sent out. Similar as the other times with a link that points to an IP address.
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, March 30th, 2008
Three-quarters of phishing sites are built on hacked servers that have been tracked down using pre-programmed Google search terms, according to research from brand-protection firm MarkMonitor.
Among other activities, MarkMonitor tracks phishing attacks that target brand names.
Researchers compiled a list of 750 Google search terms that are used to track down ...
Posted in Internet, Privacy, Security | No Comments
Monday, March 24th, 2008
Microsoft is promising that the upcoming IE (Internet Explorer) 8 will be the safest and most secure version of its Web browser yet. Of course, everyone has heard this song before. Still, with the addition of two significant new security features, it's hard to argue that the new release won't ...
Posted in Internet, Privacy, Security, Windows | No Comments