
- #ADOBE UPDATE MALWARE SCAM PDF#
- #ADOBE UPDATE MALWARE SCAM UPDATE#
- #ADOBE UPDATE MALWARE SCAM ARCHIVE#
- #ADOBE UPDATE MALWARE SCAM PATCH#
- #ADOBE UPDATE MALWARE SCAM ZIP#
If you think you might have already been Dok-ed, iMore has useful instructions for removing the trojan. Once in, it can spy on iPhone backups and online activity. Check Point says the malware is being aimed mainly at European users right now.ĭok isn't the first piece of malware we've seen targeting Mac users this year: back in February Russian hackers adapted their Xagent backdoor to work on Apple hardware as well as computers running Windows and Linux. The tried and trusted advice remains the same then: be very suspicious of any unsolicited emails from people you don't know, especially ones carrying mysterious attachments.
#ADOBE UPDATE MALWARE SCAM UPDATE#
It arrives via the old phishing email method as a zipped attachment – users have to download and attempt to open the attachment, then accept a (fake) OS software update to get Dok on their system, at which point it operates invisibly. Once it's taken root, it's able to spy on all the online digital communications happening inside your browser, including those over HTTPS. The trojan has been dubbed Dok by Check Point Technologies, and can currently evade both the virus direction built into Macs and third-party antivirus tools.
#ADOBE UPDATE MALWARE SCAM ZIP#
zip files, is entirely another.Long-suffering Windows users are probably all too aware of the sorts of nasty viruses and bugs you can catch on your computer if you're not careful, but we've got news of a new threat that targets those of you living on the Apple side of the fence.
#ADOBE UPDATE MALWARE SCAM ARCHIVE#
But falling victim into a video scam that's redefining the process of video encoding, and archive compression by sending small sized.

Opening spam emails, and clicking on the links within is one thing. The social engineering theme once again relies on the popular adult theme, offering naked videos of celebrities and related adult themed topics. This currently ongoing spam campaign, is also related to the gang behind the fake Amazon orders. Watch Video adult content themed malware campaign Although the application was shut down, the cybercriminals behind it quickly introduced a new one, once again tricking the end user into installing a bogus video player, which in reality is adware. However, both the individual/gang that's behind it, and the adult theme, remain the same.Īccording to AVG, the campaign was achieving 40,000 hits per hour, demonstrating just how fast a well organized from a social engineering perspective, campaign can spread across Facebook. What's particularly interesting about this campaign, is that it keeps reemerging using a different message over the past few weeks. Massive Facebook rogue application campaign serving adware campaign And with millions of users opening spam emails, and clicking on links found within, the malicious attackers will easily succeed.
#ADOBE UPDATE MALWARE SCAM PDF#
Moreover, according to WebSense, in an attempt to avoid detection, instead of sticking to the well proven tactic of using a malicious PDF, the actual PDF file is clean from exploits, and only included the actual download link for the malware, which the gullible end user is supposed to execute manually.
#ADOBE UPDATE MALWARE SCAM PATCH#
There are two links in the message which lead to the same IP address hosting a PDF file for instructions and an executable which is meant to be the patch to apply. The message from the Adobe associate states that the update link is to patch CVE-2010-0193.


The messages appear to be forwarded from a Director of Information Services who apparently received update instructions directly from an associate at Adobe. Yet another spamvertised campaign, which significantly differentiates itself from the others in the sense that, the social engineering theme, as well as the actual PDF file, would look and sound pretty convincing to a potential victim. ZeuS crimeware serving "Adobe Security Update" themed emails In the latest scam, the message appears to be an order confirmation from for the purchase of an expensive consumer electronics item, or a contract (spelled, tellingly, “conract“) for expensive home improvement work, purportedly to be done on the recipient’s home.Īlthough they've switched to a new theme, the campaign is launched by the same gang which was behind last week's " Look at my CV", and the " iTunes gift certificate" campaigns. zip, which when executed drops a copy of the ZeuS crimeware, next to additional malicious payload: This currently spamvertised campaign, attempts to trick the end user into executing the attached. Fake Amazon order emails malware campaign This week's Malware Watch features four campaigns, spamvertised fake Amazon orders, followed by ZeuS crimeware serving email campaign using " Adobe Security Update" as a theme, Adult content themed " Watch Video" campaign, and an overview of the " sexiest video ever" rogue application campaign, spreading across Facebook.
