WHOIS included in Web Analyzer results
Analysis results from Web Analyzer now includes WHOIS output. Current version is now 0.6.1
Analysis results from Web Analyzer now includes WHOIS output. Current version is now 0.6.1
February 3, 2013 not only marks the start of Super Bowl Sunday, it could also signify the arrival of a new untethered iOS jailbreak.
The newly formed hacking group, going by the name of evad3rs, is reportedly close to completing their latest iOS…
Marco Fioretti addresses the issue of taking scripts written for a Linux-based system and trying to use them on different systems like OS X and Windows.
Thanks to our ThreatSeeker® technology, it has been possible to detect a domain which we believe is involved in a spear phishing campaign against the users of a Rotary Club online service. The Rotary Club (also called Rotary International) is an organization that provides humanitarian services, encourages high ethical standards in all vocations, and promotes charity actions. Since the Rotary Club is a worldwide organization, each country has a number of local “clubs” for each region and they have also established an online service called “Rotary eClub”.
Specifically, we discovered another attempt to exploit the Internet Explorer vulnerability CVE-2012-4792, which was discovered in a “water holing” attack against the USA Council of the Foreign Relations Web site (http://www.cfr.org). The results of our analysis were in accordance with those reported in this blog: apparently another worldwide campaign against several organizations which have in some way attracted the interest of the attackers due to the specific audiences for their sites. In this first part of the analysis, we will report our investigation into the obfuscated code and the exploit code detected. In the second part, we will present the analysis of the unusual mechanism implemented in the shellcode that runs the malware which is installed if the exploit is successful. We will also look at some details of the malware behavior and expose some details behind the involved domains and the infrastructure of this attack.
The suspicious domain in our analysis is “rotary-eclubtw.com”, which has apparently been registered to target the Taiwanese users of the Rotary eClub service as shown in the following screenshot:
…(read more)
The Websense® ThreatSeeker® network has uncovered a typosquat hive hosting hundreds of hosts targeting
well-known brands. This hive constantly moves around to evade detection. Numerous popular brands are being abused –
can y…
Jack Wallen takes another look at the GNOME 3 desktop and is surprised at what he finds. A desktop that is the target of much derision might deserve another chance.
The VirusTotal API is now included in Web Analyzer. This means that when you inspect an URL with Web Analyzer, it's also sent to VirusTotal for analysis. Simply click the VirusTotal logo and view the result.