blog trackingRealtime Web Statistics Skype Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Skype’

Hackers Build a Skype That’s Not Controlled by Microsoft

Source: National Cyber Security - Produced By Gregory Evans

Hackers Build a Skype That’s Not Controlled by Microsoft



The web forum 4chan is known mostly as a place to share juvenile and, to put it mildly, politically incorrect images. But it’s also the birthplace of one of the latest attempts to subvert the NSA’s mass surveillance program. When […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hackers Build a Skype That’s Not Controlled by Microsoft appeared first on National Cyber Security.

View full post on National Cyber Security

o_O @Skype hacked by @Official_SEA16.

o_O @Skype hacked by @Official_SEA16. View full post on Your Anon News Read More….

View full post on The Cyber Wars

Skype in the Sights of Level 7 Crew for 15/11/2013

Today hacker collective Level 7 Crew (@Level7Crew) has announced an upcoming attack on Skype who for some time now has been spying on its users. View full post on Cyber War News Read More….

View full post on The Cyber Wars

Video Dating – Meet Someone New on Skype

ww.skyecandy.com Video Dating via Skype Read More….

View full post on

Israeli Microsoft sites, MSN, Skype, Live all hacked and defaced

#OpIsrael has today targeted a Microsoft server that contains 3 of its major service sites, Skype MSN and Live. View full post on Cyber War News

View full post on The Cyber Wars

Syrian regime uses Skype to fire Trojan at opposition activists

Further evidence has emerged that the Syrian Government is targeting opposition activists using a well-known remote access Trojan distributed through bogus Skype calls.

View full post on Techworld.com security

View full post on National Cyber Security » Computer Hacking

SpywareLady: Syrian activists targeted with fake Skype encryption tool that installs … http://t.co/yvYwulno

SpywareLady: Syrian activists targeted with fake Skype encryption tool that installs … http://t.co/yvYwulno
View full post on Twitter / SpywareLady

View full post on National Cyber Security

Skype Vulnerability Exposing User IP Addresses

Skype Vulnerability Exposing User IP Addresses
Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user’s last known IP address by …

View full post on National Cyber Security » Computer Hacking

Skype investigates tool that reveals users’ last known IP addresses

Skype said it is investigating a new tool that collects a person’s last known IP address, a potential privacy-compromising issue.Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known

Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known

Skype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, knownSkype investigates tool that reveals users’ last known IP addresses, Blog, addresses, reveals, tool, Skype, Users’, last, Investigates, known

View full post on Techworld.com security

View full post on National Cyber Security » Computer Hacking

Skype malware used in Syrian confilct

A new nasty piece of malware is now being used in the ongoing conflict in Syria, with the ability to take over an infected computer or steal documents from it.

Computer security firm Trend Micro cited reports the malware, dubbed DarkComet, is being used against supporters of the Syrian opposition movement.

“The malware used in the attacks reportedly spreads through Skype chats. Once users execute the malware, it connects to a (command and control) server in Syria … which belongs to an IP range assigned to the Syrian Telecommunications Establishment,” Trend Micro said in a blog post.

It noted this could be a response to the opposition’s increasing use of platforms such as Facebook to organize and spread their message.

Other supporters of the regime like the “Syrian Electronic Army” had sought to disrupt the opposition’s activities by defacing websites and spamming Facebook pages.

Trend Micro said DarkComet is considered a widely available Remote Access Trojan (RAT).

It said DarkComet is a full-featured RAT that has the ability to take pictures via webcam, listen in on conversations via a microphone attached to a PC, and gain full control of the infected machine.

“But the features attracting most people using this RAT are the keylogging and file transfer functionality. This way, an attacker can load any files onto the infected machine or even steal documents,” it said.

Removal tool

Trend Micro said DarkComet, created by a coder using the handle DarkCoderSc, is still being developed and version 5 was released last January 15.

“Since the reports of its use in connection with events in Syria, the author of DarkComet has expressed regret and while he will continue developing the RAT, he plans to make a DarkComet detector/remover available to the Syrian people,” Trend Micro said.

Infection via Skype chats

Trend Micro said the malware bearing a Facebook icon was reportedly distributed through Skype chats.

One sample, which Trend Micro detects as BKDR_ZAPCHAST.SG, is DarkComet 5.

But another sample obtained by Trend Micro behaves differently, and involves an initial executable, which is detected by Trend Micro as BKDR_BREUT.A.

This drops two executable files, with the first file displayed to the compromised user as a Mac Address Changer tool.

But this appears to be a simple decoy because while this is displayed, the second executable then connects to a server and downloads another file.

“These developments illustrate that targeted attacks can be conducted with widely available DIY malware tools. These tools possess all the ‘complex’ functionality attackers need to compromise their targets,” Trend Micro said. — TJD, GMA News

Article source: http://ph.news.yahoo.com/skype-malware-used-syrian-confilct-100810551.html

View full post on National Cyber Security » Virus/Malware/Worms

Page 1 of 3123»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!