Category: cyren

A study of malicious attacks on Facebook

VB2011 was held from October the 3rd till the 7th in Barcelona, Spain. We were privileged to be part of the conference where we presented “A study of malicious attacks on Facebook” (abstract here). Being fully committed to the security industry, we felt compelled to do this research that summarizes

Creative Chinese spam hides inside resized HTML textarea tags

You’ll have to take our word for it – the text below comes from Chinese spam. The text asks recipients to view the attached Excel sheet and forward it on to any relevant staff.  Of course this sort of text is bound to trigger content-based spam filters, so creative spammers

Increased usage of unregistered spam domains

Consider a spam email that promotes an online casino site. URL check and filtering systems that block access to such sites usually run a few checks before adding the URL to the “spam” category. One of these checks is that the URL is registered. Once this is known the date

Updated: Aisha Gaddafi plea for he..

Scammers have been quick to capitalize on the death of Muammar Gaddafi by sending out emails from Ayesha Gaddafi. Ayesha (also spelled Aisha) is the daughter of Muammar Gaddafi who has reportedly fled to Algeria. The creators of the email seem to have made an error by including the message

Results of our compromised/hacked/stolen accounts survey

In Late September we posted a survey where we asked you to tell us your stolen account stories. We have summarized the results in a special report “the state of hacked accounts” The data reveals that most users get hacked at high rates even when they do not think they

Facebook scam promises free Macbook Air

Compromised Facebook accounts are being used to send out scam posts promising free Apple Macbooks. The scam does not make reference to the death of Steve Jobs as others have. The link leads to marketing affiliate sites that ask for a user’s mobile phone number – users are then signed

Malware Uses New DLL Loading Technique – MS11-071

It has been a year since we have witnessed a DLL hijacking technique which loads a malicious DLL that affects hundreds of programs. The method involves dropping a collection of normal files together with the malicious DLL from within a directory. We recently analyzed the following archive sample. Only the

Twice as bad: speeding ticket with attached malware

Nobody likes receiving a traffic ticket, but one with attached malware is a lot worse. We could get into a philosophical argument about which is truly more terrible – a traffic ticket that adds points to your license and raises your insurance rates, or malware that infiltrates your PC, insinuating