Tuesday, September 01, 2015
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
This Is Google's Redesigned Logo
Instagram Gets New Features
Alliance for Open Media To Deliver Open Standard for Online Ultra High Definition Video
Seagate Develops High Density Mobile Hard Drive Technology, New Portfolio of 8TB Hard Drives
Apple To Work With Cisco On Enterprise Environment; said To Prepare Own Original Programming
Qualcomm Snapdragon 820 Processor To Geature Mobile Anti-malware Technology
WD My Cloud OS 3 Makes Cloud Storage More Personal
Samsung's Circular Gear S2 Smartwatches Unveiled
Active Discussions
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
 Home > News > General Computing > Microso...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, June 30, 2014
Microsoft Disrupts Jenxcus and Bladabindi Malware Families


Today, following an investigation to which the Microsoft Malware Protection Center (MMPC) contributed, the Microsoft Digital Crimes Unit initiated a disruption of the Jenxcus and Bladabindi malware families.

The operation began on Monday under an order issued by a federal court in Nevada and targeted traffic involving malicious software known as Bladabindi and Jenxcus, which Microsoft said work in similar ways and were written and distributed by developers in Kuwait and Algeria. In the civil case, Microsoft named two foreign nationals, Mohamed Benabdellah and Naser Al Mutairi, and a U.S. company, Vitalwerks Internet Solutions, LLC (doing business as No-IP.com), for their roles in creating, controlling, and assisting in infecting millions of computers with malicious software.

The court order allowed Microsoft to disrupt communications between infected machines and Vitalwerks Internet Solutions.

Microsoft has not accused Vitalwerks of involvement in any cybercrime, though it alleges that the company failed to take proper steps to prevent its system from being used for such activities.

These malware families can install backdoor trojans on your computer, which allow criminals to steal your information, such as your passwords, and use your computer to collect other sensitive information. For example, Bladabindi can take snapshots and record videos without your permission. It can also control your system remotely.

These backdoor trojans can also upload new components or malware to your computer to add more malicious functionality. They often communicate with hosts that are typically a Dynamic DNS service such as NO-IP because this makes them more difficult to trace.

The malware families spread primarily through social engineering techniques. For example, Bladabindi can take snapshots and record videos without your permission. It can also control your system remotely. Bladabindi also plants files with enticing names and icons on removable media and linked drives to lure new victims.

Most Jenxcus infections occur through torrents and websites when the malware is bundled with other programs or videos. Jenxcus also tries to trick you into installing it by pretending to be a Flash update that you need to install before watching a video. After infecting a computer, Jenxcus leaves enticing shortcut files on removable media that look like songs or other personal files. When opened these files run a copy of the malware.




Previous
Next
New Samsung 850 PRO SSD Is Powered by 3D V-NAND        All News        Xbox One Achievements Coming Soon to Xbox.com
Fujitsu Buys Shares of Panasonic Information Technology Solutions     General Computing News      Google To Discontinue Orkut

Get RSS feed Easy Print E-Mail this Message

Related News
WireLurker Malware Targets Apple Devices
FBI Cleanups GameOver Zeus, Cryptolocker Botnets
FBI Says BlackShades Infected Half Million Computers
Windows Malware Infects Android Devices
Malware Attack Strikes Asian, European Governments
Dropbox, WordPress Used To Spread Malware
Mobile Threats Continue Rampant Growth
Cyber Attack Targets Nato, Government Websites
Stuxnet Roots Found Back in 2005
Android Malware Found On Google Play
July 9 Could be 'Internet doomsday' for Some PC or Mac Users
Kaspersky Says Stuxnet and Flame Developers Are Connected

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .