Actus Sécurité Confirmé 2011 S50

=> FakeAV GUI/FakeAV Site requirements specification . 13/12/2011. «I got some interesting documents yesterday (and not only about FakeAV) On the past i’ve already released the requirements specification of FakePoliceAlert winlock. This time the requirements specification are related to the Braviax multirogue and to a FakeAV Site (…).»
Source : xylibox.blogspot.com/2011/12/fakeav-guifakeav-site-requirements.html?spref=tw

=> Inside Adobe Reader Zero-Day Exploit CVE 2011-2462. 14/12/2011. «McAfee researchers analyzed the exploit (the sample circulating in the wild) and figured out how the vulnerability is exploited and identified the malicious binary, which allows an attacker to take the control of the system (…).»
Source : blogs.mcafee.com/mcafee-labs/inside-adobe-reader-zero-day-exploit-cve-2011-2462
Billets en relation :
12/12/2011. Adobe Zero Day CVE-2011-2462 – with samples : contagiodump.blogspot.com/2011/12/adobe-zero-day-cve-2011-2462.html
18/12/2011. The Sykipot Campaign : blog.trendmicro.com/the-sykipot-campaign/

=> New Exploit Pack. 15/12/2011. «A new exploit pack is being used in the wild. This one was linked to malvertisements that were appearing on popular sites. Here’s one of them (…).»
Source : www.kahusecurity.com/2011/new-exploit-pack/

=> Trojan.GTalk. 15/12/2011. «Today I am going to write about an interesting Trojan, whose concept (controlling malware via instant messaging) has been used for some time. However Christmas came early this year and during one of our recent engagements we came across the C2 portion of this Trojan (screen shots are located at the end of this article). (…).»
Source : www.cyberesi.com/2011/12/15/trojan-gtalk/
Billets en relation :
16/12/2011. Source : twitter.com/#!/ChadChoron/statuses/147600818063945728

Publié par

Gof

Canard boiteux numérique ; juste intéressé, juste passionné.