Register for the Webcast

Sophos Sophos Products Security News/Trends
Malware from B to ZMalware from B to Z : Inside the threat from Blackhole to ZeroAccess

Available Continuosly

Register Now

Drive-by downloads on the web are nothing new—these attacks exploit a user’s browser to distribute malware and steal data.  The most popular drive-by malware we’ve seen recently is called Blackhole. It’s a crimeware kit that allows cybercriminals to deliver malicious code and carry out sophisticated attacks like the ZeroAccess threat – a kernel-mode rootkit.

Join Richard Wang, Director of Threat Research at SophosLabs to learn how hackers are using Blackhole and ZeroAccess together to compromise your security. Richard will discuss the following:

  • How these threats work from compromised site to infection
  • How crimeware kits are developed, bought and sold
  • The money behind this malware
  • Protecting against these types of attacks

Register for this informative webcast today

Webinars for General Audiences
Attend a webinar

Register for the General Audience webcasts today

Update: LinkedIn Confirms Account Passwords Hacked

http://www.pcworld.com/article/257045/update_linkedin_confirms_account_passwords_hacked.html

By Ian Paul, PCWorld    Jun 6, 2012 8:32 AM

6.5M LinkedIn Passwords Posted Online After Apparent Hack

UPDATED 2:15 p.m. PT

Conficker Worm Was Dry Run for Stuxnet, Researcher Says

A well-known security consultant has gone public with his startling hypothesis that Conficker, a notorious but still-mysterious computer worm that confounded IT managers for months in 2008 and 2009, was actually a dry run for Stuxnet, the worm that infected and apparently disabled an Iranian nuclear facility in 2010.

“Conficker was a door kicker,” John Bumgarner, a former U.S. Army and U.S. Marines officer who’s also worked at IBM and Lucent, told Reuters in a story that was posted online Friday morning (Dec. 2). “It built out an elaborate smoke screen around the whole world to mask the real operation, which was to deliver Stuxnet.”

If Bumgarner’s hypothesis is true, it would finally explain the mystery behind Conficker, which had infected perhaps 15 million PCs by early 2009. The worm built a huge botnet army of linked computers, yet never switched it on. Its authorship has never been determined, though evidence hints at Ukrainian cybercriminals.

Stuxnet is thought to have been created by U.S. and Israeli intelligence services to cripple the Iranian nuclear-fuel-processing facility at Natanz, which suffered unexplained accidents and shutdowns in the summer of 2010.

Other security researchers aren’t convinced by Bumgarner’s scenario.

“This account stretches my credulity to [the] breaking point,” said Britain-based Trend Micro researcher Rik Ferguson in a blog posting later Friday.

“Conficker/Stuxnet is quite the stretch,” tweeted Kaspersky Lab researcher and ZDNet writer Ryan Naraine on Friday.

Too many coincidences?

Bumgarner, who is now the chief technology officer for the U.S. Cyber Consequences Unit, a nonprofit think-tank that advises government agencies on cybersecurity, thinks there are too many similarities between Conficker and Stuxnet to be coincidental.

Both were highly sophisticated, both spread via USB sticks and both rapidly mutated, he said. Bumgarner also said there are overlapping dates marked in the developed code for both, as well as in Duqu, a recently discovered Trojan that many security experts think was created by the writers of Stuxnet.

Ferguson didn’t buy it.

“The levels of sophistication in Conficker and Stuxnet are in different leagues,” he countered. “Stuxnet was a far more sophisticated animal, taking advantage of zero-day vulnerabilities and requiring specialist knowledge of SCADA systems and nuclear facilities.”

Ferguson pointed out that all of Conficker’s exploits were of already-known vulnerabilities that many people simply hadn’t bothered to patch. In contrast, Stuxnet used four rare and valuable “zero-day” Windows exploits that had never before been known of, and Duqu used one.

Bumgarner also leaves out the fact that Conficker initially spread through a vulnerability in the networking component of Windows. Only later did it move on to exploiting the “instant-run” feature that automatically ran programs on USB sticks as soon as they were plugged into PCs.

Conficker was eventually defeated by a group of security and software companies that Microsoft put together in early 2009. It is now detected and destroyed by most major anti-virus software packages. Microsoft is still offering a $250,000 reward for information leading to its creators.

Nevertheless, Bumgarner told Reuters that Conficker, like Stuxnet, is a cyberweapon, not a criminal creation, and that its silent botnet may someday wake up.

“Conficker represents the largest cyberarmy in the world,” he said. “These soldiers are just waiting for their next mission.”

http://www.securitynewsdaily.com/-conficker-stuxnet-duqu-1384/

Looking For New Clients?

Who Isn’t!

If you’re like us, you probably hate actually ‘chasing down’ new clients.

And honestly, the ones you have to convince to buy from you aren’t the ones
you truly want. After all, amateurs convince, while professionals sort.

What you really want are the people who “get it”… those willing to exchange their
value they receive for the price they’re willing to pay.

You’re looking for motivated buyers!

If you have a motivated prospect or buyer, you don’t have to tell them why they should
buy your goods or services. You just deliver the goods, then, let them know how to pay!

With our processes, we’ll show you the best way of making that happen.

* Finding the kind of customers you seek, no matter where they are.

* How to be all over the internet in as many places as you want – all at once.

A cool little benefit of this is… you don’t even need your own website.

Are you ready?

Contact us now and we’ll get you started.

Contact for info – Subject: Get Me Clients
Just Click… admin@visionseoservice.com .