Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: tuyugi007
« on: 14. March 2010., 13:59:01 »

Thanks for the update
Posted by: fotis100
« on: 12. March 2010., 07:52:47 »

thanks for info
Posted by: Raviraj
« on: 22. February 2010., 08:01:34 »

Yes even i have got the same mail regarding the Flash Player update . When i installed the flash player exe file instead of installing the flash player the exe file installs a malicious file Trojan. Its really a bad news. Thanks for updating about this issue.

Colorado Mortgage
Posted by: jasonx
« on: 27. November 2009., 16:55:41 »

Thank you for sharing. Now I know that now..
Posted by: Samker
« on: 27. November 2009., 09:42:07 »

Just to let you know, the actual or real flash installer's name is 'install_flash_player_ax.exe' (as of 27/11/09)
Triple-click on cancel button if you see any other file name than 'install_flash_player_ax.exe'


Thanks for info. Eric...  :up:
Posted by: F3RL
« on: 27. November 2009., 09:34:51 »

Just to let you know, the actual or real flash installer's name is 'install_flash_player_ax.exe' (as of 27/11/09)
Triple-click on cancel button if you see any other file name than 'install_flash_player_ax.exe'
Posted by: Samker
« on: 26. November 2009., 07:01:56 »



Phishing campaign has hit more than 3.5 million mailboxes, researchers say.

Researchers have detected a new phishing attack that promises to enhance the security of the user's emailbox -- and then downloads a malicious Trojan instead.

The email requests that recipients click on a link in the body of the email to update the "security mode" of their emailboxes, according to researchers at Red Condor, an email security tool vendor.

Users who click on the link are taken to a Website that advises them to update to the latest version of the Macromedia Flash Player by downloading "flashinstaller.exe." This executable is actually a banking Trojan that is known to disable firewalls, steal sensitive financial data, and provide hackers with remote access capabilities, Red Condor says.

The malware is more commonly known as Win32:Zbot-MGA (Avast), W32/Bifrost.C.gen!Eldorado (F-Prot), PWS-Zbot.gen.v (McAfee), or PWS:Win32/Zbot.gen!R (Microsoft), the researchers note.

The spam campaign was detected late on Nov. 20; within the first six hours, Red Condor says it blocked more than 500,000 email messages. So far, the company says it has stopped more than 3.5 million messages belonging to this campaign.

"Protecting inboxes is seen as business-critical, so it is no surprise that spammers and cybercriminals are playing off of email users' growing security concerns with security-focused junk mail," says Tom Steding, president and CEO of Red Condor. Hours after the spam campaign began, only about half of the antivirus products had begun to recognize and block it, Steding says.

"Spam that suggests users update their Flash Player is a common type of scam during the holidays, but it is often associated with viewing a fake e-card or a viral video," Steding observes. "We encourage email users, particularly those returning to full inboxes after the Thanksgiving holiday, to immediately delete these messages and notify their IT administrators."

(darkReading)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising