|
|
|
Attacking Mac systems through false security tool |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Attacking Mac systems through false security tool Par EvilFingersLe [2009-01-26] à 19:26:19
Présentation : Who said that everything was for windows? ;-P While the bulk of the various techniques of deception and infection are very common on Windows platforms, security is the responsibility of any system, regardless of their infrastructure or platform, so there are threats from rogue type (also called scareware) for Mac systems. In this case, the recent false security tool called iMunizator (actually is not as recent :-) gave its first steps during 2007 and early 2008, but returned to the "cargo" again), you can be downloaded from various web sites that respond to a single IP address (67.205.75.10) hosted by Ukraine, a Web hosting company called iWeb Technologies Inc. www.imunizator .com www.imunizator .net imunizator .com imunizator .net mac-imunizator .net This malware shares "website" to other rogue much known across the IP 70.38.19.203: Antispyware Deluxe (antispywaredeluxe .com) Antivirus 2009 (antivirus-2009-pro .net) Antivirus 2010 (av2010 .net) Vista Antivirus 2008 (vav-2008 .net) iMunizator is deploying its strategy of deception for some time, switching domain to revive, even changing his name (formerly MacSweeper). One more interesting is that the transfer of shares to "buy" the wrong tool is done through a company called Plimus e-commerce, completely legal but Israeli origin with offices in central U.S. (San Diego and Silicon Valley) and Ukraine. That is why users will see in the address bar secure HTTPS protocol on any recommendation, and other safety guidelines that seek to demonstrate that we are operating from a trusted site. The current malware seeking to obtain sensitive information from users to commit fraud in which a high rate of propagation felt windows platforms, but this means that the creators of malware is turning its sights toward new goals. Therefore, we must manage them good security practices regardless of the technology to which it applies. More information about scareware: Una recorrida por los últimos scarewawe Una recorrida por los últimos scarewawe II # jorge
Les mots clés de la revue de presse pour cet article : security Les videos sur SecuObs pour les mots clés : security Les mots clés pour les articles publiés sur SecuObs : security Les éléments de la revue Twitter pour les mots clés : security
Les derniers articles du site "EvilFingers" :
- EFBlog Moved Permanently - Crimeware in 2009 - Anti-Virus Live 2010. Talking with the enemy - RussKill. Application to perform denial of service attacks - Bypassing Windows Unknown Publisher Verification For Web Downloaded Executables - Fusion. A concept adopted by the current crimeware II - Disinformation campaign to spread malware - A brief glance inside Fragus - Exploiting WebView through Internet Explorer to remotely discover windows directory - Koobface campaign spread through Blogspot
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|