Page 1 of 1
OS : TRIPPLE BOOT WINDOWS 7 RC BUILD 7100, VISTA SP2, XP SP3,VIRTUAL PC BETA, XP MODE BETA
Posts : 1385
Rubies : 5447
Likes : 0
Take a second look though, the link gets directed to a site supposedly hosting a video posted by the same person that was received the Facebook message from. In fact not only was the malicious landing page displaying his name, it had also pulled the photo from his Facebook profile. A very neat little piece of social engineering.
Clicking the Install button redirects to a download site for the file setup.exe which is the new Koobface variant detected as WORM_KOOBFACE.AZ. It is hosted on an IP address in another part of the world, and in the last hour, we’ve seen 300+ different unique IP addresses hosting setup.exe and we’re expecting more. All seen IP addresses hosting the said malicious file are now detected as HTML_KOOBFACE.BA.
Analysis by engineers reveal that WORM_KOOBFACE.AZ propagates through other social networking sites as well. It first searches for cookies created by the following sites:
More at; http://blog.trendmicro.com/new-variant-of-koobface-worm-spreading-on-facebook/
EXPERIENCE IS NOT WHAT HAPPENS TO A MAN BUT IT IS WHAT A MAN DOES WITH WHAT HAPPENS TO HIM
OS : Linux,XP,Vista, Windows 7,8 10
Arch. : Both
Anti-Malware : Eset Smart Security
Posts : 440
Rubies : 3993
Likes : 1
eeeeekk!!! thats scary, thanks for the info!!!!
Create an account or log in to leave a reply
You need to be a member in order to leave a reply.
Page 1 of 1
Permissions in this forum:You cannot reply to topics in this forum