blog trackingRealtime Web Statistics Skype Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Skype’

o_O @Skype hacked by @Official_SEA16.

o_O @Skype hacked by @Official_SEA16. View full post on Your Anon News Read More….

View full post on The Cyber Wars

Skype in the Sights of Level 7 Crew for 15/11/2013

Today hacker collective Level 7 Crew (@Level7Crew) has announced an upcoming attack on Skype who for some time now has been spying on its users. View full post on Cyber War News Read More….

View full post on The Cyber Wars

Video Dating – Meet Someone New on Skype

ww.skyecandy.com Video Dating via Skype Read More….

View full post on

Israeli Microsoft sites, MSN, Skype, Live all hacked and defaced

#OpIsrael has today targeted a Microsoft server that contains 3 of its major service sites, Skype MSN and Live. View full post on Cyber War News

View full post on The Cyber Wars

Syrian regime uses Skype to fire Trojan at opposition activists

Further evidence has emerged that the Syrian Government is targeting opposition activists using a well-known remote access Trojan distributed through bogus Skype calls.

View full post on Techworld.com security

View full post on National Cyber Security » Computer Hacking

SpywareLady: Syrian activists targeted with fake Skype encryption tool that installs … http://t.co/yvYwulno

SpywareLady: Syrian activists targeted with fake Skype encryption tool that installs … http://t.co/yvYwulno
View full post on Twitter / SpywareLady

View full post on National Cyber Security

Skype Vulnerability Exposing User IP Addresses

Skype Vulnerability Exposing User IP Addresses
Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user’s last known IP address by …

View full post on National Cyber Security » Computer Hacking

Skype investigates tool that reveals users’ last known IP addresses

Skype said it is investigating a new tool that collects a person’s last known IP address, a potential privacy-compromising issue.Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known

Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known

Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, knownSkype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known

View full post on Techworld.com security

View full post on National Cyber Security » Computer Hacking

Skype malware used in Syrian confilct

A new nasty piece of malware is now being used in the ongoing conflict in Syria, with the ability to take over an infected computer or steal documents from it.

Computer security firm Trend Micro cited reports the malware, dubbed DarkComet, is being used against supporters of the Syrian opposition movement.

“The malware used in the attacks reportedly spreads through Skype chats. Once users execute the malware, it connects to a (command and control) server in Syria … which belongs to an IP range assigned to the Syrian Telecommunications Establishment,” Trend Micro said in a blog post.

It noted this could be a response to the opposition’s increasing use of platforms such as Facebook to organize and spread their message.

Other supporters of the regime like the “Syrian Electronic Army” had sought to disrupt the opposition’s activities by defacing websites and spamming Facebook pages.

Trend Micro said DarkComet is considered a widely available Remote Access Trojan (RAT).

It said DarkComet is a full-featured RAT that has the ability to take pictures via webcam, listen in on conversations via a microphone attached to a PC, and gain full control of the infected machine.

“But the features attracting most people using this RAT are the keylogging and file transfer functionality. This way, an attacker can load any files onto the infected machine or even steal documents,” it said.

Removal tool

Trend Micro said DarkComet, created by a coder using the handle DarkCoderSc, is still being developed and version 5 was released last January 15.

“Since the reports of its use in connection with events in Syria, the author of DarkComet has expressed regret and while he will continue developing the RAT, he plans to make a DarkComet detector/remover available to the Syrian people,” Trend Micro said.

Infection via Skype chats

Trend Micro said the malware bearing a Facebook icon was reportedly distributed through Skype chats.

One sample, which Trend Micro detects as BKDR_ZAPCHAST.SG, is DarkComet 5.

But another sample obtained by Trend Micro behaves differently, and involves an initial executable, which is detected by Trend Micro as BKDR_BREUT.A.

This drops two executable files, with the first file displayed to the compromised user as a Mac Address Changer tool.

But this appears to be a simple decoy because while this is displayed, the second executable then connects to a server and downloads another file.

“These developments illustrate that targeted attacks can be conducted with widely available DIY malware tools. These tools possess all the ‘complex’ functionality attackers need to compromise their targets,” Trend Micro said. — TJD, GMA News

Article source: http://ph.news.yahoo.com/skype-malware-used-syrian-confilct-100810551.html

View full post on National Cyber Security » Virus/Malware/Worms

FBI spyware not Skype responsible for spilling MegaUpload secrets

FBI investigators may have infected MegaUpload‘s computers with spyware so as to monitor Skype and email messaging, it’s been suggested, with sources within the Microsoft-owned VoIP company claiming it was not asked to turn over conversation logs. Multiple chat records were included by the FBI within its case against MegaUpload founder Kim Dotcom and other employees at the file-sharing site, dating back as much as five years, though exactly how the US government acquired them is unclear. Sources within Skype tell CNET that no approach was made to them to release private logs.

However, a spyware leak from within MegaUpload’s own computers looks more likely to be the cause. “Electronic evidence was obtained though search warrants,” a spokesman for the US Attorney for the Eastern District of Virginia said, “which are reviewed and approved by a US court.”

The suggestion is that the FBI deployed a tool called CIPAV, or “Computer and Internet Protocol Address Verifier”, which has been previously used to monitor web use in other investigations. Akin to more traditional spyware, CIPAV loiters silently on the victim’s computers keeping a record of software, IP address, which sites are being visited, traffic over the network and other details. Meanwhile, Skype text conversations are stored in a local folder, which CIPAV could easily have had access to.

Dotcom was denied bail in New Zealand last month, over concerns that the outspoken exec could attempt to flee extradition to the US. Meanwhile, legitimate users are still unable to access their own data stored on MegaUpload’s servers, though the Electronic Frontier Foundation and one of the file-sharing site’s hosts have joined forces to start MegaRetrieval, exploring the potential of extracting non-copyrighted uploads.

Article source: http://www.slashgear.com/fbi-spyware-not-skype-responsible-for-spilling-megaupload-secrets-02211727/

View full post on National Cyber Security » Spyware/ Cyber Snooping

Page 1 of 3123»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!