Web threats

Malware descriptions

Malware in the cloud

We have seen many examples in the past: the use of Twitter as a communication channel for a botnet, using Amazon EC2 for hosting C&Cs for distributing malware. Today we will see how malware maximizes its revenues using this kind of services with a minimum impact on victims computer.

Research

Pegel now in banners

We’re still monitoring Pegel, and we’ve come across something which piqued our interest: redirects to malicious websites hosting exploits weren’t only coming from infected legitimate sites, but also from flash ads on legitimate sites.

Incidents

Another look at VBMania

You may have noticed that we lowered our internet threat level to low risk. We have taken another look at Email-Worm.Win32.VBMania and its prevalence and came to the conclusion the increased threat level was not warranted.

Reports
Subscribe to our weekly e-mails

The hottest research right in your inbox