Macy’s, Costco brand names used by Rogueware

Recently we have received e-mails which leads to new Rogueware infection and the e-mail are sent using well known brand names like Macy’s, Costco Photo Center. E-mail contains a below URL which is a fake online scanner and it offers you to download file antivirus_2.exe later on. hxxp://ho[xxxx]ami.cz.cc/scanner5/?afid=24 The file “antivirus_2.exe” downloads and installs Rogueware […]

Microsoft released Updates for LNK file Vulnerability

Microsoft has released updates to resolve the vulnerability which is discussed in Security Advisory 2286198 and which is being exploited. More information regarding the vulnerability can be found on the below links https://www.microsoft.com/technet/security/advisory/2286198.mspx https://blogarchive.quickheal.com/index.php?/archives/166-CVE-2010-2568-LNK-file-automatically-executes-code-in-Control-Panel-shortcuts.html https://blogarchive.quickheal.com/index.php?/archives/167-StuxNet,-CVE-2010-2568-misconceptions-and-facts.html The patch to resolve the vulnerability is released and it is available to download visit below link. https://www.microsoft.com/technet/security/bulletin/ms10-046.mspx We recommend […]

One more Twitter scam to increase fake followers.

Popularity of Twitter is growing and so are the scams on this popular social networking website. Its kind of cool to have Twitter account and having thousands of followers on Twitter is kind of icing on cake. This greed of having more followers is being targeted by the scammers on Twitter. Few months back I […]

Drooptroop leads to rogueware Security Master AV

A variant of the Trojan family Drooptroop leads to the infection of Rougeware named Security Master AV. It redirects the google result to a fake online scanner link. It displays fake threat messages and asks user to download or run the rougeware setup: QuickHeal detects the setup file as TrojanDownloader.FraudLoad.gxv and Rougeware is detected as […]

Few hours to Black Hat 2010, Vegas.

Black Hat 2010 will kick start few hours from now. Lot of security experts and security community guys and gals will be looking forward for the latest news and happenings there. I am one of the guy who could not make it to the Black Hat and gona miss the fun. I am sure there […]

Orkut Phishing Attack

Recently I received a scrap on my orkut account from unknown person, explaining the trick to Freely Recharge Mobile. And falsely claiming that the version was introduced to all orkut users as a gift from Google services! It asked me to visit a link which I did, it took me to https://meka555.blogspot.com/ [do not click […]

Workaround from Microsoft to fix the issue related to CVE-2010-2568

Microsoft is working hard to fix the issue related to CVE-2010-2568 and to release the security updates as early as possible to patch vulnerable systems. Meanwhile, Microsoft has released a Microsoft security advisory (2286198) which lists the set of workarounds. Workarounds refers to “a setting” or “configuration change” that does not correct the underlying issue […]

StuxNet, CVE-2010-2568 misconceptions and facts

Lot is being discussed and written about the latest StuxNet worm/virus/trojan/rootkit. After analyzing the StuxNet samples and having closer look at the .LNK files I realized that lot of miss concepts are making round over the internet. Many of the security news websites have just copied the contents of blogs and added their own conclusions […]

Coca-Cola scam on Facebook

“I am part of the 98.0% of people that are NEVER gonna drink Coca Cola again after this HORRIFIC video –> https://www.[deleted_link_to_video]”. What will you do, if you get such post on your Facebook via your friend? Obviously you will be tempted to click the link. If you click on the link, you’ll be asked […]

CVE-2010-2568: LNK file automatically executes code in Control Panel shortcuts

Microsoft LNK files [MS-SHLLINK] which are now turned into auto executable files by malware authors using its undocumented feature is a hot topic on most of the security forums. We have received specially crafted LNK files along with Portable executable files having the mentioned LNK file vulnerability. When user visits the folder containing these files, […]