Activity Stream
48,167 MEMBERS
6720 ONLINE
besthostingforums On YouTube Subscribe to our Newsletter besthostingforums On Twitter besthostingforums On Facebook besthostingforums On facebook groups

Results 1 to 7 of 7
  1.     
    #1
    Member
    Website's:
    ZilleJulle.com PornBoxIt.com TheCavernForum.com TheFlix.net

    Default Warning: Fake LinkedIn Spam Can Steal Your Bank Passwords

    Warning: Fake LinkedIn Spam Can Steal Your Bank Passwords
    Bogus LinkedIn emails can infect your computer with ZeuS, a password-stealing Trojan. I know, because it just happened to me.
    Dan Tynan
    Monday, September 27, 2010 07:05 PM PDT



    I feel like a complete idiot. I just got taken by a LinkedIn spam that may have just stolen my banking password.


    This is not the first time I've been an idiot or clicked on something I shouldn't. But this one could be really bad for me.


    Today, spammers using fake Linked-In invitations attacked the Net in a massive way. How massive? According to Cisco Security, at one point today nearly 1 in 4 spam messages was a Fake LinkedIn invite.

    Linked-In spam is nothing new -- I wrote about it just last month-- but this attack was particularly nasty, because it can embed password-stealing malware into your browser without you realizing it.




    My story: I saw several LinkedIn invites in my Gmail spam folder, and stupidly opened one of them inside Google Chrome. I even saw that the links inside the email were not to LinkedIn but to some oddly named third-party site. But curious about what would happen (and stupidly confident that my Kaspersky anti-malware software would protect me), I clicked it. My browser started to launch a new site, then quickly redirected to my home page.


    Weird, I thought. I tried it again. Same thing happened. I figured that whatever site it was driving me toward had already been taken down by one of the anti-malware orgs like StopBadware.com, and thought nothing more about it.


    A couple of hours later I logged into my banking site to check on my account. No big deal.


    An hour after that I received the following email from Cisco Security:


    Starting this morning, Monday 9/26, at 10am GMT, cyber criminals sent spam email messages targeting the LinkedIn social media community.


    Victims are emailed an alert link with a fictitious social media contact request. These messages accounted for as much as 24% of all spam sent within a 15-minute interval. Clicking the link, victims are taken to a web page that says "PLEASE WAITING.... 4 SECONDS" and redirects them to Google. During those four seconds, the victim's PC is infected with the ZeuS data theft malware by a drive-by download. ZeuS embeds itself in the victim's web browser and captures personal information, such as online banking credentials, and is widely used by criminals to pilfer commercial bank accounts.


    Organizations should encourage individuals to delete such requests, especially if they do not know the name of the contact. This is the second spam attack this month, preceded by the "Here You Have" email worm a few weeks ago. Cisco expects to see more spam messages containing malware sent to organizations to collect personal information.


    Gulp.



    OK, I've done stupid things before, with and without computers. I have had many malware infestations, including one variant of the Cool Web Search spyware app that required three months of trying different anti-spyware tools before I could nuke it (Webroot's Spy Sweeper did the job then). But as far as I know I've never compromised my bank account information -- until now.


    I've been scanning my system using Kaspersky, and so far it hasn't detected anything out of the ordinary (which doesn't mean ZeuS isn't still lurking -- no anti-malware software is 100 percent reliable). I've already logged on from Firefox and changed my banking info -- but the folks at Cisco Security tell me that ZeuS might still be able to compromise my account.


    Here's what Cisco Security Researcher Henry Stern had to tell me:


    Bottom line here: Don't do what I did. Delete any LinkedIn spam that looks even the slightest bit suspicious. Needless to say I won't be sleeping very well tonight. May you rest a bit easier.
    PBI NetWork Reviewed by PBI NetWork on . Warning: Fake LinkedIn Spam Can Steal Your Bank Passwords Warning: Fake LinkedIn Spam Can Steal Your Bank Passwords Bogus LinkedIn emails can infect your computer with ZeuS, a password-stealing Trojan. I know, because it just happened to me. Dan Tynan Monday, September 27, 2010 07:05 PM PDT I feel like a complete idiot. I just got taken by a LinkedIn spam that may have just stolen my banking password. Rating: 5
    Webmaster add your site!

  2.   Sponsored Links

  3.     
    #2
    Banned
    Website's:
    rapidleechhosting.net ponofilms.net wupload.ws
    thnx man for the warning
    i never use LinkedIn . com

    hope any one try to publish this on many forum

  4.     
    #3
    Respected Developer
    damn i was lucky i did not opened that link and trashed email right away
    http://screensnapr.com/u/4lsuhk.png
    Bots Development | Web Development | Wordpress Customization | PSD Conversion

    Life has many twists and turns in it, you have to take what you are given and use it for the best.

  5.     
    #4
    mmm mmm!
    Thanks for the warning!

    - Mentos
    HATERS GONNA probably bring up some valid points considering I am an ignorant little twat so far up my own ass that i blame my problems on everyone and if you criticize me you're automatically wrong.

  6.     
    #5
    Banned
    Website's:
    TehHost.net
    hello

    sad i didn't received that mail....

    can someone please post the url which contain that malware or watever....

    i love playing with trojans and viruses

  7.     
    #6
    Member
    Website's:
    ZilleJulle.com PornBoxIt.com TheCavernForum.com TheFlix.net
    mRAza thx for the image how it looks
    Webmaster add your site!

  8.     
    #7
    Member
    Website's:
    Tastro.org HDTVXviDLOL.com EpisodeSeasons.com FileBorg.org W-47.com
    why do you even open such emails? or accept any certificates etc.
    LE with your pr2 site? <a href="http://tastro.org/">Tastro.org</a> or link exchance with our category page: <a href="http://tastro.org/i/hdtv">HDTV</a> | <a href="http://tastro.org/i/dvdrip">DVDRip</a> | <a href="http://tastro.org/i/r5">R5</a> | <a href="http://tastro.org/i/bdrip">BDRip</a> | <a href="http://tastro.org/i/brrip">BRRip</a>

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Hackers Steal $6.7M In Bank Cyber Heist
    By Daniel in forum News & Current Events
    Replies: 4
    Last Post: 18th Jan 2012, 11:37 AM
  2. [Selling] 20 NICHE TARGETED QUALITY BACKLINK for $20 [NO SCRAPEBOX SPAM COMMENT/ AMR SPAM]
    By souleclipse in forum Completed Transactions
    Replies: 0
    Last Post: 8th Jan 2012, 10:47 AM
  3. [Selling] Passwords.ws - Porn Passwords Forum
    By ViPeRR in forum Completed Transactions
    Replies: 13
    Last Post: 20th Mar 2011, 04:01 PM
  4. Replies: 34
    Last Post: 6th Feb 2011, 08:48 PM

Tags for this Thread

BE SOCIAL