ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Simda botnet taken down in global operation

Simda botnet taken down in global operation | ICT Security-Sécurité PC et Internet | Scoop.it

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet





Gust MEES's insight:

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


Gust MEES's curator insight, April 13, 2015 4:55 AM

The Simda botnet, believed to have infected more than 770,000 computers worldwide, has been targeted in a global operation.


In a series of simultaneous actions around the world, on Thursday 9 April, 10 command and control servers were seized in the Netherlands, with additional servers taken down in the US, Russia, Luxembourg and Poland.


The operation involved officers from the Dutch National High Tech Crime Unit (NHTCU) in the Netherlands, the Federal Bureau of Investigation (FBI) in the US, the Police Grand-Ducale Section Nouvelles Technologies in Luxembourg, and the Russian Ministry of the Interior’s Cybercrime Department “K” supported by the INTERPOL National Central Bureau in Moscow.


Learn more: 


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet




Scooped by Gust MEES
Scoop.it!

La NSA prépare les États-Unis à la cyberguerre | CyberWar | CyberSecurity

La NSA prépare les États-Unis à la cyberguerre | CyberWar | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
L'Agence nationale de sécurité américaine (NSA) entraîne ses hackers au combat cybernétique, d'après des documents étudiés par Der Spiegel.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
L'Agence nationale de sécurité américaine (NSA) entraîne ses hackers au combat cybernétique, d'après des documents étudiés par Der Spiegel.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Quantum


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

Angriff per Router: Sony-Hacker nutzten ungesicherte Geräte aus

Angriff per Router: Sony-Hacker nutzten ungesicherte Geräte aus | ICT Security-Sécurité PC et Internet | Scoop.it
Der Hackerangriff, der über Weihnachten das Sony PlayStation Network und Microsofts Onlinedienst Xbox Live lahmlegte, wurde über ein Botnetz aus gekaperten Heimroutern ausgeführt.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


Gust MEES's insight:
Der Hackerangriff, der über Weihnachten das Sony PlayStation Network und Microsofts Onlinedienst Xbox Live lahmlegte, wurde über ein Botnetz aus gekaperten Heimroutern ausgeführt.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


No comment yet.
Scooped by Gust MEES
Scoop.it!

Tens of thousands of pirate gamers enslaved by Bitcoin botnet

Tens of thousands of pirate gamers enslaved by Bitcoin botnet | ICT Security-Sécurité PC et Internet | Scoop.it
'Watch Dogs' players targeted for access to their juicy GPUs


"If you happen to download cracked games via Torrent or other P2P sharing services, chances are that you may become a victim of [a] lucrative trojan bundled with a genuine GPU miner," BitDefender chief strategist Catalin Cosoi said of an early Bitcoin miner that targeted gamers.

Gust MEES's insight:

"If you happen to download cracked games via Torrent or other P2P sharing services, chances are that you may become a victim of [a] lucrative trojan bundled with a genuine GPU miner," BitDefender chief strategist Catalin Cosoi said of an early Bitcoin miner that targeted gamers.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Un botnet mondial composé de 1 500 terminaux de vente

Un botnet mondial composé de 1 500 terminaux de vente | ICT Security-Sécurité PC et Internet | Scoop.it

Les chercheurs de l'entreprise de sécurité IntelCrawler ont mis à jour un botnet réunissant environ 1 500 points de vente et autres systèmes de vente au détail compromis dans 36 pays dans le monde.


IntelCrawler a évalué la taille du botnet Nemanja à 1 478 systèmes PoS infectés. L'entreprise de sécurité a localisé ces systèmes dans différents pays, dont les États-Unis, le Royaume-Uni, le Canada, l'Australie, la Chine, la Russie, le Brésil et le Mexique. Mais le botnet Nemanja a également été détecté dans d'autres pays comme l'Argentine, l'Autriche, le Bangladesh, la Belgique, le Chili, la République tchèque, le Danemark, l'Estonie, la France, l'Allemagne, Hong Kong, l'Inde, l'Indonésie, Israël, l'Italie, le Japon, les Pays-Bas, la Nouvelle-Zélande, la Pologne, le Portugal, l'Afrique du Sud, l'Espagne, la Suisse, Taiwan, la Turquie, l'Uruguay, le Venezuela et la Zambie.

Gust MEES's insight:

IntelCrawler a évalué la taille du botnet Nemanja à 1 478 systèmes PoS infectés. L'entreprise de sécurité a localisé ces systèmes dans différents pays, dont les États-Unis, le Royaume-Uni, le Canada, l'Australie, la Chine, la Russie, le Brésil et le Mexique. Mais le botnet Nemanja a également été détecté dans d'autres pays comme l'Argentine, l'Autriche, le Bangladesh, la Belgique, le Chili, la République tchèque, le Danemark, l'Estonie, la France, l'Allemagne, Hong Kong, l'Inde, l'Indonésie, Israël, l'Italie, le Japon, les Pays-Bas, la Nouvelle-Zélande, la Pologne, le Portugal, l'Afrique du Sud, l'Espagne, la Suisse, Taiwan, la Turquie, l'Uruguay, le Venezuela et la Zambie.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Attackers use reflection techniques for larger DDoS attacks

Attackers use reflection techniques for larger DDoS attacks | ICT Security-Sécurité PC et Internet | Scoop.it
Akamai announced a new global DDoS attack report, which shows that in Q1, DDoS attackers relied less upon traditional botnet infection in fa...
No comment yet.
Rescooped by Gust MEES from WordPress and Annotum for Education, Science,Journal Publishing
Scoop.it!

Hackers turn 162,000 WordPress sites into DDoS attack tools

Hackers turn 162,000 WordPress sites into DDoS attack tools | ICT Security-Sécurité PC et Internet | Scoop.it
Legitimate sites forced to aid criminals' illicit botnet operations


Hackers have hijacked more than 162,000 legitimate WordPress sites, connecting them to a criminal botnet and forcing them to mount distributed denial-of-service (DDoS) attacks, according to security firm Sucuri.


Sucuri CTO Daniel Cid said the company uncovered the botnet when analysing an attack targeting one of its customers. Cid said Sucuri managed to trace the source of the attack to legitimate WordPress sites.

"The most interesting part is that all the requests were coming from valid and legitimate WordPress sites. Yes, other WordPress sites were sending random requests at a very large scale and bringing the site down," read the blog.



Via Gust MEES
Gust MEES's insight:


Learn more:


http://www.scoop.it/t/wordpress-annotum-for-education-science-journal-publishing/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnets


http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/


http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

Rescooped by Gust MEES from QR-Code and its applications
Scoop.it!

Zeus and Citadel the biggest banking botnets of 2013

Zeus and Citadel the biggest banking botnets of 2013 | ICT Security-Sécurité PC et Internet | Scoop.it

A new report from Dell SecureWorks Counter Threat Unit CTU research team breaks down the biggest banking botnets from last year, and reveals that 900 financial institutions from around the globe have been targeted.


Via Frederic GOUTH, Gust MEES
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices

Java-based malware driving DDoS botnet infects Windows, Mac, Linux devices | ICT Security-Sécurité PC et Internet | Scoop.it
Multi-platform threat exploits old Java flaw, gains persistence.

 

Researchers have uncovered a piece of botnet malware that is capable of infecting computers running Windows, Mac OS X, and Linux that have Oracle's Java software framework installed.

 

The cross-platform HEUR:Backdoor.Java.Agent.a, as reported in a blog post published Tuesday by Kaspersky Lab, takes hold of computers by exploiting CVE-2013-2465, a critical Java vulnerability that Oracle patched in June. The security bug is present on Java 7 u21 and earlier. Once the bot has infected a computer, it copies itself to the autostart directory of its respective platform to ensure it runs whenever the machine is turned on.

 

Compromised computers then report to an Internet relay chat channel that acts as a command and control server.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux

 

Scooped by Gust MEES
Scoop.it!

Have we seen the end of the ZeroAccess botnet?

Have we seen the end of the ZeroAccess botnet? | ICT Security-Sécurité PC et Internet | Scoop.it
Since Microsoft took positive action against the ZeroAccess botnet at the beginning of December, SophosLabs has been paying close attention to see if the owners would attempt to revitalise the botn...
No comment yet.
Scooped by Gust MEES
Scoop.it!

ZeroAccess : Microsoft participe à la lutte contre un botnet

ZeroAccess : Microsoft participe à la lutte contre un botnet | ICT Security-Sécurité PC et Internet | Scoop.it
Au travers d’un partenariat de sécurité public-privé, Europol et le FBI, associés à des acteurs technologiques dont Microsoft, ont mené une action contre le botnet ZeroAccess. Mais si son fonctionnement est perturbé, il n’est cependant pas démantelé.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft and partners fight back against the ZeroAccess botnet

Microsoft and partners fight back against the ZeroAccess botnet | ICT Security-Sécurité PC et Internet | Scoop.it
Microsoft, in conjunction with Europol and the FBI, have successfully taken down the click fraud servers used by ZeroAccess, disrupting one of the world's largest and most resilient botnets.

 

In the meantime though we should give praise to Microsoft and its crime busting partners for the serious blow they have landed on a difficult opponent.

 

Unless Microsoft or Europol can identify the 'John Does 1-8' mentioned in the court documents then we can expect ZeroAccess to resurface in the near future.

 

Gust MEES's insight:

 

ZeroAccess, also known as the Sirefef botnet, is believed to have infected more than 9 million computers worldwide. 



No comment yet.
Scooped by Gust MEES
Scoop.it!

Rise seen in use of Google service for mobile botnets

Rise seen in use of Google service for mobile botnets | ICT Security-Sécurité PC et Internet | Scoop.it
Google Cloud Messaging serving as conduit for sending data from C&C servers

 

Criminals rent such networks to others for malware distribution. Among the malware distributed is the most sophisticated Android Trojan, known as Obad, Kaspersky said.

 

The malware opens a backdoor in an infected device in order to download additional malicious code for stealing money from victims' bank accounts. While not common in the U.S., people in other countries often use their smartphone for money transfers.

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

3 million strong RAMNIT botnet taken down | CyberCrime | CyberSecurity

3 million strong RAMNIT botnet taken down | CyberCrime | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
3 million strong RAMNIT botnet taken down
Posted on 25.02.2015
The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through Europol’s European Cybercrime Centre (EC3), to shut down command and control servers used by the RAMNIT botnet.

RAMNIT spread malware via seemingly trustworthy links sent out on phishing emails or social networking websites. If users running Windows clicked on the links, the malware would be installed, infecting the computer. Infected computers would then be under the control of criminals, enabling them to access personal or banking information, steal passwords and disable antivirus protection.

Investigators believe that RAMNIT may have infected over three million computers worldwide, with around 33,000 of those being in the UK. It has so far largely been used to attempt to take money from bank accounts. Analysis is now taking place on the servers and an investigation is ongoing.
Gust MEES's insight:

3 million strong RAMNIT botnet taken down
Posted on 25.02.2015
The National Crime Agency’s National Cyber Crime Unit (NCCU) worked with law enforcement colleagues in the Netherlands, Italy and Germany, co-ordinated through Europol’s European Cybercrime Centre (EC3), to shut down command and control servers used by the RAMNIT botnet.

RAMNIT spread malware via seemingly trustworthy links sent out on phishing emails or social networking websites. If users running Windows clicked on the links, the malware would be installed, infecting the computer. Infected computers would then be under the control of criminals, enabling them to access personal or banking information, steal passwords and disable antivirus protection.

Investigators believe that RAMNIT may have infected over three million computers worldwide, with around 33,000 of those being in the UK. It has so far largely been used to attempt to take money from bank accounts. Analysis is now taking place on the servers and an investigation is ongoing.


No comment yet.
Scooped by Gust MEES
Scoop.it!

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | CyberSecurity

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and tapping into 'unwitting data mules' to pass along exfiltrated information.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SONY


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


Gust MEES's insight:
Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and tapping into 'unwitting data mules' to pass along exfiltrated information.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=SONY


http://www.scoop.it/t/securite-pc-et-internet/?tag=cyberwar


http://www.scoop.it/t/securite-pc-et-internet/?tag=NSA


http://www.scoop.it/t/securite-pc-et-internet/?tag=TAO


No comment yet.
Scooped by Gust MEES
Scoop.it!

The Rise Of The Resilient Mobile Botnet | MobileSecurity | BYOD | CyberSecurity

The Rise Of The Resilient Mobile Botnet | MobileSecurity | BYOD | CyberSecurity | ICT Security-Sécurité PC et Internet | Scoop.it
New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Botnet


Gust MEES's insight:
New report on what researchers call one of the 'most sophisticated mobile botnets online' shows how profitable mobile malware has become.


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Botnet


No comment yet.
Scooped by Gust MEES
Scoop.it!

Operation takes down crime network affecting European electronic payments

Operation takes down crime network affecting European electronic payments | ICT Security-Sécurité PC et Internet | Scoop.it
Bulgarian and French judicial and law enforcement authorities, working in close cooperation with the European Cybercrime Centre (EC3) at Eur...


The primary modus operandi of the criminals and their associates was to harvest financial data from ATMs in different areas of France (e.g. Nancy, Metz, and Lyon) as well as other EU countries, which they then used to create fake payment cards. The fake cards could then be used to withdraw large amounts of cash from ATMs outside the European Union (e.g. in the Philippines, Malaysia and Indonesia).


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=POS


Gust MEES's insight:

The primary modus operandi of the criminals and their associates was to harvest financial data from ATMs in different areas of France (e.g. Nancy, Metz, and Lyonas well as other EU countries, which they then used to create fake payment cards. The fake cards could then be used to withdraw large amounts of cash from ATMs outside the European Union (e.g. in the Philippines, Malaysia and Indonesia).


Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=POS


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD | Mobile Bots Grow 1,000% in 2013

The number of bad bots has grown exponentially in recent years, driving poor internet performance for individuals and the loss of control over connected devices; wholesale theft of online intellectual property, content and data; unnecessarily high bandwidth fees; and compromised websites that are otherwise key to mission-critical functions. In fact, bad bots almost doubled as a percentage of all web traffic over the course of 2013, from 12.25% to 23.6%. And the number of mobile bots is up a staggering 1,000%.


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security



Gust MEES's insight:


Learn more:


https://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet


http://www.scoop.it/t/securite-pc-et-internet/?tag=Mobile+Security


Scooped by Gust MEES
Scoop.it!

Researchers Uncover Interesting Browser-Based Botnet

Researchers Uncover Interesting Browser-Based Botnet | ICT Security-Sécurité PC et Internet | Scoop.it
Security researchers at Incapsula discovered a DDoS attack on a video site that used a persistent XSS vulnerability and malicious Javascript.
Gust MEES's insight:


Security researchers discovered an odd DDoS attack against several sites recently that relied on a persistent cross-site scripting vulnerability in a major video Web site and hijacked users’ browsers in order to flood the site with traffic.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Android Botnets Hop on the TOR Train

Android Botnets Hop on the TOR Train | ICT Security-Sécurité PC et Internet | Scoop.it
Cyber criminals can infiltrate your mobile devices with the just discovered first "TOR Trojan for Android".
No comment yet.
Scooped by Gust MEES
Scoop.it!

First Android bootkit malware spotted; reportedly found on over 350,000 mobile devices

First Android bootkit malware spotted; reportedly found on over 350,000 mobile devices | ICT Security-Sécurité PC et Internet | Scoop.it
A new trojan for Android has been discovered that resides in the memory of infected devices and launches itself early on in the OS loading stage. Even if some elements of the threat ...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Thingbot: Botnetz infiziert Kühlschrank

Thingbot: Botnetz infiziert Kühlschrank | ICT Security-Sécurité PC et Internet | Scoop.it
Ein US-Sicherheitsunternehmen hat ein Botnetz enttarnt. Das Besondere daran ist, dass etwa ein Viertel der infizierten Geräte keine Computer sind, sondern andere Internet-fähige Geräte - darunter
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things

 

http://www.scoop.it/t/21st-century-innovative-technologies-and-developments/?tag=Internet+Of+Things

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Man Arrested by German Police Is Reportedly the Author of the Skynet Botnet

Man Arrested by German Police Is Reportedly the Author of the Skynet Botnet | ICT Security-Sécurité PC et Internet | Scoop.it
Last week, we learned that police in Germany arrested two individuals who used a modified version of an existing malware to create a botnet which they...

 

Skynet is capable of performing various tasks, including launching DDOS attacks, mining Bitcoin and stealing banking information.


Gust MEES's insight:

 

Skynet is capable of performing various tasks, including launching DDOS attacks, mining Bitcoin and stealing banking information.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft, Europol, FBI and industry partners disrupt notorious ZeroAccess botnet that hijacks search results

News and perspectives covering the top stories, events and activities from Microsoft. The content for this blog includes the official information and stories from all of Microsoft's primary businesses.
Gust MEES's insight:

 

ZeroAccess targets all major search engines and browsers, including Google, Bing and Yahoo!


No comment yet.
Scooped by Gust MEES
Scoop.it!

Infosecurity - Symantec Finds the Early Stages of a Server-based Botnet Build

Infosecurity - Symantec Finds the Early Stages of a Server-based Botnet Build | ICT Security-Sécurité PC et Internet | Scoop.it
Trojan backdoors have traditionally attacked desktop and now mobile computers. In recent months, however, attackers have started to target servers.
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Botnet

 

No comment yet.