# Tags

Google Rediffmail Lottery Scam.

Today i received a mail as below. ************************************** from cox rooney reply-to mr.coxrooney@live.com to date Tue, Oct 5, 2010 at 12:50 AM mailed-by indiatimes.com signed-by indiatimes.com Dear Winner We are Pleased to inform you that you have won a prize money of ( £500,000.00 GBP ) by Google /Rediffmail Lottery inconjunction with the GOOGLE GMAIL […]

Youtube Phishing.

Today I came across below with a link saying https://youtube.com-prizes.com/win/ [DO NOT VISIT THIS LINK] Congratulations! You’ve been selected for our survey. Answer the questions below and claim $2,741.88! It asked me few question and then diverted to below link. https://www.5staroutlet.com/crown/v95/weborder.asp?sk=LZXA91&oid=12345678 [DO NOT VISIT THIS LINK] We doubt if its really a genuine link. I […]

Microsoft Security Bulletin Advance Notification for September 2010

For the coming month Microsoft plan to release 10 bulletins. Out of the 10 bulletins, four bulletins have been rated “Critical” and six bulletins have been rated “Important”. 7 bulletins are related to “Remote Code Execution” vulnerability and two bulletins are related to “Elevation of Privilege” vulnerability and one is related to “Information Disclosure”. The […]

Rogue software uses the name “Microsoft Security Essentials”

“Fake Microsoft Security Essentials Rogueware Alert” pop ups declaring that it was unable to remove Unknown Win32/Trojan threat Once user clicks on clean, it recommends to online scan and shows legitimate AVs names. In addition it also shows free install for Rogue software “Red Cross”, “Peak Protection”, “Pest Detector”, “Major Defense Kit” “AntiSpy Safeguard” Once […]

Vulnerability in ASP.NET

MS10-070 security update resolves a publicly disclosed vulnerability in ASP.NET. The vulnerability could allow information disclosure. An attacker who successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server. This vulnerability can also be used for data tampering, which, if successfully exploited, could be used to decrypt […]

Orkut attacked by ‘Bom Sabado’ Worm

Many user on Orkut are receiving scraps form their friends with words “Bom Sabado!”. The word “Bom Sabado” means “Good Saturday” in Portuguese. This is a Worm which has attacked the social networking service today. The worm seems to be posting scraps with the text “Bom Sabado” and also adding affected users to new Orkut […]

Trojan “Oficla” pushesh Rogueware “Antimalware Doctor”

We have analyzed a suspicious email in our security lab that email shown below Above email has an attachment. This attachment is a zip archive which contain a trojan oficla variant. This trojan has a Microsoft word file icon. Upon execution it downloads below script file. https://ilovelasvegas.ru/web/St/bb.php?v=200&id=881716830&b=23avgust&tm=72 The script contains string as shown below: “[info]runurl:https://91.204.48.46/kasuli.exe|taskid:39|delay:15|upd:0|backurls:[/info]” […]

Online Form Site Builder usage

The phishing community has discovered new way to collect the information from victims. They now are using Online Form Site Builder service to create form and collect victim’s data. We received a mail targeting ICICI bank user, which contained a html file as an attachment. The subject line of the mail is “Exclusive Privacy Option […]

‘Here you have’ virus hits some major companies in US.

Thursday we observed a new worm that started to spread over Internet by emailing the address books of infected PC. The email contains the subject line as “Here you have” or “Just for you” and contains a link to a file which seems to be a PDF file. The email when received in inbox looks […]

Zero Day critical vulnerability in Adobe Reader and Acrobat Reader

A critical vulnerability (CVE-2010-2883) exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and Unix and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh. This vulnerability could cause a crash and potentially allow an attacker to take control of the affected system. Currently we have not come across such sample but […]