Quantcast
Channel: DIY – Webroot Threat Blog
Browsing all 20 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Vendor of TDoS products resets market life cycle of well known 3G USB...

Driven by popular demand, the underground market segment for TDoS (Telephony Denial of Service) attacks continues flourishing with established vendors continuing to actively develop and release new DIY...

View Article



Image may be NSFW.
Clik here to view.

DIY Python-based mass insecure WordPress scanning/exploting tool with...

Throughout 2013, we not only witnessed the re-emergence of proven mass, efficiency-oriented Web site hacking/exploitation tactics, such as, the reliance on Google Dorks scanning, good old fashioned...

View Article

Image may be NSFW.
Clik here to view.

Newly launched managed ‘compromised/hacked accounts E-shop hosting as...

Regular readers of Webroot’s Threat Blog are familiar with our “A Peek Inside a Boutique Cybercrime-Friendly E-shop” series, originally started in 2012, highlighting the trend emerging at the time of...

View Article

Image may be NSFW.
Clik here to view.

Newly released Web based DDoS/Passwords stealing-capable DIY botnet...

Driven by the never ending supply of newly released DIY (do it yourself) underground market releases, in combination with the systematically rebooted life cycles of releases currently in circulation,...

View Article

Image may be NSFW.
Clik here to view.

Cybercriminals release new Web based keylogging system, rely on penetration...

In need of a fresh example of penetration pricing, within the cybercrime ecosystem, used by a cybercrime-friendly vendor in an attempt to quickly gain as much market share as possible in the...

View Article


Image may be NSFW.
Clik here to view.

A peek inside a modular, Tor C&C enabled, Bitcoin mining malware bot

Cybercriminals continue to maliciously ‘innovate’, further confirming the TTP (tactics, techniques and procedure) observations we made in our Cybercrime Trends – 2013 assessment back in December, 2013,...

View Article

Image may be NSFW.
Clik here to view.

Malicious DIY Java applet distribution platforms going mainstream – part two

In a cybercrime ecosystem, dominated by client-side exploits serving Web malware exploitation kits, cybercriminals continue relying on good old fashioned social engineering tricks in an attempt to...

View Article

Image may be NSFW.
Clik here to view.

A peek inside a subscription-based DIY keylogging based type of...

Cybercriminals continue to systematically release DIY (do-it-yourself) type of cybercrime-friendly offerings, in an effort to achieve a ‘malicious economies of scale’ type of fraudulent model, which is...

View Article


Image may be NSFW.
Clik here to view.

A peek inside a newly launched all-in-one E-shop for cybercrime-friendly...

Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious ‘know-how’, further contributing to the growth of the...

View Article


Image may be NSFW.
Clik here to view.

Malicious Web-based Java applet generating tool spotted in the wild

Despite the prevalence of Web based client-side exploitation tools as the cybercrime ecosystem’s primary infection vector, in a series of blog posts, we’ve been emphasizing on the emergence of...

View Article

Image may be NSFW.
Clik here to view.

Vendor of TDoS products resets market life cycle of well known 3G USB...

Driven by popular demand, the underground market segment for TDoS (Telephony Denial of Service) attacks continues flourishing with established vendors continuing to actively develop and release new DIY...

View Article

Image may be NSFW.
Clik here to view.

DIY Python-based mass insecure WordPress scanning/exploting tool with...

Throughout 2013, we not only witnessed the re-emergence of proven mass, efficiency-oriented Web site hacking/exploitation tactics, such as, the reliance on Google Dorks scanning, good old fashioned...

View Article

Image may be NSFW.
Clik here to view.

Newly launched managed ‘compromised/hacked accounts E-shop hosting as...

Regular readers of Webroot’s Threat Blog are familiar with our “A Peek Inside a Boutique Cybercrime-Friendly E-shop” series, originally started in 2012, highlighting the trend emerging at the time of...

View Article


Image may be NSFW.
Clik here to view.

Newly released Web based DDoS/Passwords stealing-capable DIY botnet...

Driven by the never ending supply of newly released DIY (do it yourself) underground market releases, in combination with the systematically rebooted life cycles of releases currently in circulation,...

View Article

Image may be NSFW.
Clik here to view.

Cybercriminals release new Web based keylogging system, rely on penetration...

In need of a fresh example of penetration pricing, within the cybercrime ecosystem, used by a cybercrime-friendly vendor in an attempt to quickly gain as much market share as possible in the...

View Article


Image may be NSFW.
Clik here to view.

A peek inside a modular, Tor C&C enabled, Bitcoin mining malware bot

Cybercriminals continue to maliciously ‘innovate’, further confirming the TTP (tactics, techniques and procedure) observations we made in our Cybercrime Trends – 2013 assessment back in December, 2013,...

View Article

Image may be NSFW.
Clik here to view.

Malicious DIY Java applet distribution platforms going mainstream – part two

In a cybercrime ecosystem, dominated by client-side exploits serving Web malware exploitation kits, cybercriminals continue relying on good old fashioned social engineering tricks in an attempt to...

View Article


Image may be NSFW.
Clik here to view.

A peek inside a subscription-based DIY keylogging based type of...

Cybercriminals continue to systematically release DIY (do-it-yourself) type of cybercrime-friendly offerings, in an effort to achieve a ‘malicious economies of scale’ type of fraudulent model, which is...

View Article

Image may be NSFW.
Clik here to view.

A peek inside a newly launched all-in-one E-shop for cybercrime-friendly...

Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious ‘know-how’, further contributing to the growth of the...

View Article

Image may be NSFW.
Clik here to view.

Malicious Web-based Java applet generating tool spotted in the wild

Despite the prevalence of Web based client-side exploitation tools as the cybercrime ecosystem’s primary infection vector, in a series of blog posts, we’ve been emphasizing on the emergence of...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images