Exposing the Market for Stolen Credit Cards Data
What’s the average price for a stolen credit card? How are prices shaped within the cybercrime ecosystem? Can we talk about price discrimination within the underground marketplace? Just how easy is to...
View ArticleMobile Threat Update: Week 14
Is “Private number” really private? Apparently not. This week, the AVG MobilationT research team found a new PUP (Potential Unwanted Program) named ’441 Israel’ targeting Israeli users. After our...
View ArticleOlmasco bootkit: next circle of TDL4 evolution (or not?)
ESET – Olmasco (also known as SST, MaxSS) is a modification of the TDL4 bootkit family that we’ve been aware of since summer 2011. We started to track a new wave of activity from a new Olmasco dropper...
View ArticleTool Talk: Cracking the Code on XtremeRAT
Late last week, reports began to surface that the Israeli police (along with other regional law enforcement) were targeted by a malware attack. The entry vector was described as a phishing campaign...
View ArticleWhat Would Scammers Want With My Information?
In passing, I recalled talking to my neighbor where I mentioned working in the area of information security. His next question quickly came out- “Why do these scammers want my information?” The more...
View Article
More Pages to Explore .....