Many new ways that do hackers to spread viruses in cyberspace. Here are some new type of attack that was launched by Kaspersky.
In April 2012, reported 700 thousand Mac OS X computers worldwide are infected with Trojan Flashback. Infected computers to be combined into a botnet that was given Flashfake, allowing cybercriminals to add other malicious module into the computer.
Way is quite unique and relatively new in cyberspace. Even Flashfake attack had begun seeping into the WordPress blog in late February to early March 2012. About 85% of these blogs are in the United States.
Here is another type of attack is also very dangerous.
Blackhole Exploit Kit
Kaspersky Lab reported the presence of two activities that use Spam Blackhole Exploit Kit to install malware. The first occurrence is found on Twitter, where more than 500 infected accounts.
Activity is sending spam to the users twitter link that directs them to malicious sites that have Blackhole Exploit Kit, then the site will be installing scareware into the computer in the form of fake anti-virus notification is sent to computer users scan their systems to look for infection.
Email PhishingThis method is actually quite old school, but now increasingly enhanced by various acts of deception that spit. One case in point occurred in late March when many users receive a spoofed email U.S. Airways.
The cyber criminals phishing email in an effort to deceive the people are clicking on the email sent. The link offers a 'reservation details online', including a choice of check-in flight with U.S. Airways.
If a link is clicked, the user will be redirected to a fake website which contains the Blackhole Exploit Kit contains a banking malware. Banking malware will install itself into the computer and steal confidential data online banking users.
These spam messages sent in bulk while the criminals the people who will be waiting to book flights with U.S. Airways, and directing them to click a link in the email you send. mobilize them to malicious sites that have Blackhole Exploit Kit, then the site will be installing scareware into the computer in the form of fake anti-virus notification is sent to computer users scan their systems to look for infection.
Malware PonselEarly April, a new type of Android malware found in Japan. Unfortunately, the incidence in Japan is nearly 30 malicious applications are available on Google Play and at least 70 thousand users have downloaded one of 30 such applications.
Malware of this type can be connected to a server that has been determined. If a connection occurs, the malware will download the MP4 video file. This malware is also capable of stealing confidential information from the infected device, including contact names, email addresses and a list of telephone numbers available in the Android device. Kaspersky Mobile Security detects this malware as Trojan.AndroidOS.FakeTimer.
Some time ago this malware infects a number of devices found. Remarkably, these malicious programs do not perform any suspicious activity. But if there are further examined various commands allow cyber criminals to record phone conversations, stealing GPS coordinates, text or change the network configuration.
Fortunately, this malware is not up to Google meyambangi Play. However the owner of the phone should still be careful when installing the application from anywhere. Kaspersky Mobile Security detects this malware as Backdoor.AndoidOS.TigerBot.