Vendor of TDoS products resets market life cycle of well known 3G USB...
Driven by popular demand, the underground market segment for TDoS (Telephony Denial of Service) attacks continues flourishing with established vendors continuing to actively develop and release new DIY...
View ArticleDIY Python-based mass insecure WordPress scanning/exploting tool with...
Throughout 2013, we not only witnessed the re-emergence of proven mass, efficiency-oriented Web site hacking/exploitation tactics, such as, the reliance on Google Dorks scanning, good old fashioned...
View ArticleNewly launched managed ‘compromised/hacked accounts E-shop hosting as...
Regular readers of Webroot’s Threat Blog are familiar with our “A Peek Inside a Boutique Cybercrime-Friendly E-shop” series, originally started in 2012, highlighting the trend emerging at the time of...
View ArticleNewly released Web based DDoS/Passwords stealing-capable DIY botnet...
Driven by the never ending supply of newly released DIY (do it yourself) underground market releases, in combination with the systematically rebooted life cycles of releases currently in circulation,...
View ArticleCybercriminals release new Web based keylogging system, rely on penetration...
In need of a fresh example of penetration pricing, within the cybercrime ecosystem, used by a cybercrime-friendly vendor in an attempt to quickly gain as much market share as possible in the...
View ArticleA peek inside a modular, Tor C&C enabled, Bitcoin mining malware bot
Cybercriminals continue to maliciously ‘innovate’, further confirming the TTP (tactics, techniques and procedure) observations we made in our Cybercrime Trends – 2013 assessment back in December, 2013,...
View ArticleMalicious DIY Java applet distribution platforms going mainstream – part two
In a cybercrime ecosystem, dominated by client-side exploits serving Web malware exploitation kits, cybercriminals continue relying on good old fashioned social engineering tricks in an attempt to...
View ArticleA peek inside a subscription-based DIY keylogging based type of...
Cybercriminals continue to systematically release DIY (do-it-yourself) type of cybercrime-friendly offerings, in an effort to achieve a ‘malicious economies of scale’ type of fraudulent model, which is...
View ArticleA peek inside a newly launched all-in-one E-shop for cybercrime-friendly...
Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious ‘know-how’, further contributing to the growth of the...
View ArticleMalicious Web-based Java applet generating tool spotted in the wild
Despite the prevalence of Web based client-side exploitation tools as the cybercrime ecosystem’s primary infection vector, in a series of blog posts, we’ve been emphasizing on the emergence of...
View ArticleVendor of TDoS products resets market life cycle of well known 3G USB...
Driven by popular demand, the underground market segment for TDoS (Telephony Denial of Service) attacks continues flourishing with established vendors continuing to actively develop and release new DIY...
View ArticleDIY Python-based mass insecure WordPress scanning/exploting tool with...
Throughout 2013, we not only witnessed the re-emergence of proven mass, efficiency-oriented Web site hacking/exploitation tactics, such as, the reliance on Google Dorks scanning, good old fashioned...
View ArticleNewly launched managed ‘compromised/hacked accounts E-shop hosting as...
Regular readers of Webroot’s Threat Blog are familiar with our “A Peek Inside a Boutique Cybercrime-Friendly E-shop” series, originally started in 2012, highlighting the trend emerging at the time of...
View ArticleNewly released Web based DDoS/Passwords stealing-capable DIY botnet...
Driven by the never ending supply of newly released DIY (do it yourself) underground market releases, in combination with the systematically rebooted life cycles of releases currently in circulation,...
View ArticleCybercriminals release new Web based keylogging system, rely on penetration...
In need of a fresh example of penetration pricing, within the cybercrime ecosystem, used by a cybercrime-friendly vendor in an attempt to quickly gain as much market share as possible in the...
View ArticleA peek inside a modular, Tor C&C enabled, Bitcoin mining malware bot
Cybercriminals continue to maliciously ‘innovate’, further confirming the TTP (tactics, techniques and procedure) observations we made in our Cybercrime Trends – 2013 assessment back in December, 2013,...
View ArticleMalicious DIY Java applet distribution platforms going mainstream – part two
In a cybercrime ecosystem, dominated by client-side exploits serving Web malware exploitation kits, cybercriminals continue relying on good old fashioned social engineering tricks in an attempt to...
View ArticleA peek inside a subscription-based DIY keylogging based type of...
Cybercriminals continue to systematically release DIY (do-it-yourself) type of cybercrime-friendly offerings, in an effort to achieve a ‘malicious economies of scale’ type of fraudulent model, which is...
View ArticleA peek inside a newly launched all-in-one E-shop for cybercrime-friendly...
Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious ‘know-how’, further contributing to the growth of the...
View ArticleMalicious Web-based Java applet generating tool spotted in the wild
Despite the prevalence of Web based client-side exploitation tools as the cybercrime ecosystem’s primary infection vector, in a series of blog posts, we’ve been emphasizing on the emergence of...
View Article
More Pages to Explore .....