Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 42863
  • Total Topics: 16072
  • Online Today: 1386
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 02. September 2014., 19:50:27 »


With me I'm reading a lot more understanding. Read several other web site for me. I'm reading this to understand it better.

That's great  ::) , did you need some help with understanding of this Topic?

cya later,

S.
Posted by: hyorinpoppy
« on: 01. September 2014., 06:11:32 »


With me I'm reading a lot more understanding. Read several other web site for me. I'm reading this to understand it better.
Posted by: Samker
« on: 14. July 2014., 09:56:27 »



The source code for an impressively small but capable malware program that targets online bank accounts has been leaked, according to CSIS Security Group of Denmark.

The program, known as “Tinba” or “Zusy,” was discovered around mid-2012 and infected tens of thousands of computers in Turkey. It is notable for having a very small code base—just 20K—but capabilities similar to malware much larger in size.

Last week, CSIS found a post in an underground forum that included source code for Tinba, which turned out to be the same code studied a couple of years ago by the company, wrote Peter Kruse, CTO of CSIS: https://www.csis.dk/en/csis/news/4303/

The leak of its source code means other cybercriminals could begin using it, as such programs are often only offered for sale in forums. The source code for an online banking malware program called Zeus was leaked in 2011, which opened up its use to a wider range of cybercriminals, CSIS noted.

Although Tinba’s source code release is unlikely to have the same impact as Zeus, “making the code public increases the risk of new banker Trojans to arise based partially on Tinba source code,” Kruse wrote. The code appears to be from an early version of Tinba.

Kruse wrote that CSIS gave a presentation at a recent conference in Boston that covered Tinba, which described how its analysts believe the original malware code was sold and then improved upon by other developers.

Tinba can interfere with online banking sessions, creating new fields that users must fill out during an online banking session. That information can then be used to compromise their accounts.

In a joint report released in 2012, CSIS and Trend Micro wrote that more than 60,000 computers in Turkey appeared to be infected with Tinba: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_w32-tinba-tinybanker.pdf
Tinba appeared to be distributed using Blackhole, a now shuttered exploit kit that probed computers for software vulnerabilities and delivered malware if a computer doesn’t have current patches.

(PCW)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising