Search
Close this search box.

Category: cyren

Malware Uses New DLL Loading Technique – MS11-071

It has been a year since we have witnessed a DLL hijacking technique which loads a malicious DLL that affects hundreds of programs. The method involves dropping a collection of normal files together with the malicious DLL from within a directory. We recently analyzed the following archive sample. Only the

Twice as bad: speeding ticket with attached malware

Nobody likes receiving a traffic ticket, but one with attached malware is a lot worse. We could get into a philosophical argument about which is truly more terrible – a traffic ticket that adds points to your license and raises your insurance rates, or malware that infiltrates your PC, insinuating

Updated: NACHA Payment cancelled – scam continues

In February 2011, NACHA alerted the public about fraudulent emails being distributed that appeared to be sent from NACHA and signed by a non-existent NACHA employee. We reported this campaign back in June 2011 but it has come back in the past 2 weeks with a new twist to trick

Spammer marketing from “Spam Center Flow’

Even spammers need to do marketing – the email below (translated from Russian) advertises a spam (sorry, “direct emailer”) group called “Flow”. See previous blog post with a similar example that included costs.  Spam Center “Flow” welcomes you!  That was over the summer, it’s time to leave and the active,

Shopping in my sleep? No, just malware.

I received my confirmation email from Athleta so quickly, I didn’t even remember placing the order. But I was intrigued by the possibility of my having ordered a long list of great-sounding swimwear and summer clothes from Athleta without even realizing it. Am I that addicted to e-commerce that I

The Commtouch compromised account survey

(For more info about this topic see our previous post.) We’d like to hear your story so we can get a better picture of how compromised accounts happen, what the bad guys do with the accounts, and how people react. Of course we’ll publish the results as soon as we

Step 1 – infect millions of computers. Step 2 – ?

Someone somewhere is trying hard. The “someone” is a cybercriminal or organization, and since the 8th of August they have been trying hard to infect millions of computers worldwide. The purpose of this vast computing force is still not clear.  The attacks of the last month have made extensive use