Friday, September 27, 2013

REPOST: New information-theft malware 'Napolar' is gaining traction, researchers warn

The number of infections caused by a malware called Solarbot/Napolar has significantly increased during the past few weeks, according to antivirus vendor AVAST. The article below reports on the active development of the said malware.
IDG News Service — A new piece of information-stealing malware that appeared earlier this year has been rapidly gaining traction during the past few weeks, with hundreds of infection attempts being detected every day by antivirus vendors.
The malware is called Solarbot and its creator first started to advertise it to cybercriminals in May, security researchers from antivirus vendor Avast said Wednesday. The number of infection attempts using this malware increased significantly over the past few weeks, the researchers said.
Image Source: www.news.mindprocessors.com

Researchers from antivirus vendor ESET have also been tracking the same threat. "We have uncovered many details about this bot since it became active at the end of July, with in-the-wild infections starting mid-August," they said. "There have been reports of thousands of infections, many of them in South America."
Both Avast and ESET antivirus products detect the malware under the name Napolar.
Solarbot/Napolar is advertised through a professional-looking and publicly accessible website that lists the malware's features and tracks the development progress in an actively updated changelog. The site also provides a manual for using the malware and information on how to develop plug-ins for it.
According to the ESET researchers, buying the malware's binary file, which can be used to infect computers, costs US$200.
Image Source: www.macforensicslab.com
Solarbot is able to launch several types of DDoS (distributed denial-of-service) attacks, can act as a reverse SOCKS5 proxy, steal POP3 and FTP login credentials from many email and FTP clients, and steal information entered by victims into Web forms in Internet Explorer, Mozilla Firefox or Google Chrome.
However, the malware's functionality can be extended through plug-ins. The bot's developers offer a plug-in SDK (software development kit) and also provide some example plug-ins to steal Bitcoin wallets or collect computer information.
According to data received by Avast from installations of its products, infection attempts with Solarbot are detected on several hundred unique computers every day. The malware's distribution seems to be global, but the most-affected countries are Colombia, Venezuela, Peru, Mexico, Argentina, Philippines, Vietnam and Poland.
Image Source: www.bizreport.com
Researchers from ESET suspect that the malware is spread through compromised Facebook accounts, because some of the samples found so far have names like "Photo_032.JPG_www.facebook.com.exe." The malware can steal Facebook log-in credentials using its form-grabbing feature, so attackers can use those credentials to access Facebook accounts and spread the malware to other people, the researchers said.
Although this bot is similar in functionality to Trojan programs like Zeus or SpyEye that are already widely used, its popularity might grow because it is actively maintained, easy to use and can be extended easily through plug-ins, the ESET researchers said.
Due to its solid malicious performance and reasonable price of $200, this bot could be on the rise in the near future, the Avast researchers warned.
Ron Hovsepian currently heads IntraLinks Inc., a recognized leader in software-as-a-service computing. Read more about secure online data management on this website.

Friday, September 20, 2013

Data security: Knowing the risks during M&As



The digital age presents many businesses with a whole range of opportunities to streamline processes, reach broader markets, and save money.  However, it has also brought in new threats, particularly in terms of corporate espionage and other forms of illegal data leaks.  Protecting proprietary data and the data entrusted by customers to the company requires great effort, which in itself can be a hindrance when collaborating or merging with another company.

Image Source: www.logtas.com
There are many reasons for protecting corporate data.  Proprietary data, which include documents on the company and details of operations, is vital in maintaining competitive edge over other companies.  For companies with large amounts of data from customers in storage, they are held responsible for the management of that data and its protection from unscrupulous individuals who wish to use it for illegal purposes.

Image Source: www.itpro.co.uk
Unexpected malicious breaches aside, one of the many sources of potential data leakage is the process of mergers and acquisitions, where two companies begin exchanging vital data to break ground for their collaborative endeavors.  Leaks in this process could come about from giving information by accident to people and parties other than the intended recipients.

Image Source: www.blog.rjssoftware.com
Ron Hovsepian is the President, CEO, and Chair of Intralinks, a company that provides secure data sharing infrastructure for companies. Visit this website for more information on data security for mergers and acquisitions.