Skip to content

Gotham Security Daily Threat Alerts

by on January 21, 2014

January 17, Softpedia – (International) At least one smart refrigerator used in massive cyberattack. Researchers at Proofpoint analyzed a large-scale spam campaign that involved over 750,000 malicious emails and found that more than 100,000 Internet-connected consumer electronic devices were used in the attack, including multimedia centers, smart TVs, routers, and at least one smart refrigerator. Source:

January 17, Threatpost – (International) SCADA company patches HMI zero day disclosed at S4 conference. Ecava released a patch for its IntegraXor supervisory control and data acquisition (SCADA) interface software January 16 that addresses a zero-day vulnerability disclosed January 15 at a security conference. Source:

January 17, The Register – (International) Bitcoin’s so over. We’re mining Primeco…Oh SNAP, my box is a ZOMBIE! A researcher at Panda Security discovered several malicious mining programs for the Primecoin digital currency that include malware that can compromise users’ systems, hide itself as rootkits, disable antivirus programs, and allow the computer to be used as part of a botnet. Source:

January 17, Softpedia – (International) Trojan disguised as legitimate applications uses infected PCs to mine Litecoins. Researchers at Doctor Web identified a trojan disguised as legitimate applications and browser extensions that uses infected systems to mine for the Litecoin digital currency. The trojan is signed with digital certificates from legitimate applications and has infected over 311,000 computers, mostly in the U.S. Source:

January 17, Softpedia – (International) Humor website serves malware, again. Barracuda Labs researchers found that humor Web site was compromised the week of January 13 and being used to redirect users to pages that serve malware by exploiting browser and Java vulnerabilities. The site was previously compromised to serve malware in November 2013 Source:

January 16, Softpedia – (International) Cybercriminals are distributing malware with fake Flash Player served from SkyDrive. Researchers at F-Secure discovered a recent spike in Trojan.JS.Blacole.Gen infections originating from a malware campaign that uses compromised Web sites to redirect users and attempts to get them to install fake Flash Player updates. The trojan is then downloaded from a Microsoft SkyDrive account. Source:

January 16, SC Magazine – (International) Researchers discover a point-of-sale malware written in VBScript. Researchers at IntelCrawler identified a new piece of point-of-sale (POS) malware known as Decebal for sale on underweb forums. The malware is written in VBScript and can use antivirus bypass techniques. Source:

From → Security

Comments are closed.

%d bloggers like this: