Monday, October 20, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
SK Telecom and Samsung Join Hands to Lead 5G Network Technology
Pantech Applied for Bankruptcy Protection In The US
IBM To Offload Chip Business To Globalfoundries: report
Microsoft To Launch A Wearable Device Soon
FCC To Explore High-frequency Wireless Technologies
Mozilla Hello Offers Voice and Video Calls Through The Browser
Samsung Adds Intel Processor To Chromebook 2
LG Ultra-Portable HD MiniBeam Projector Features Built-in Battery
Active Discussions
How to generate lots of different CDs quickly
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
 Home > News > General Computing > Microso...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, June 30, 2014
Microsoft Disrupts Jenxcus and Bladabindi Malware Families


Today, following an investigation to which the Microsoft Malware Protection Center (MMPC) contributed, the Microsoft Digital Crimes Unit initiated a disruption of the Jenxcus and Bladabindi malware families.

The operation began on Monday under an order issued by a federal court in Nevada and targeted traffic involving malicious software known as Bladabindi and Jenxcus, which Microsoft said work in similar ways and were written and distributed by developers in Kuwait and Algeria. In the civil case, Microsoft named two foreign nationals, Mohamed Benabdellah and Naser Al Mutairi, and a U.S. company, Vitalwerks Internet Solutions, LLC (doing business as No-IP.com), for their roles in creating, controlling, and assisting in infecting millions of computers with malicious software.

The court order allowed Microsoft to disrupt communications between infected machines and Vitalwerks Internet Solutions.

Microsoft has not accused Vitalwerks of involvement in any cybercrime, though it alleges that the company failed to take proper steps to prevent its system from being used for such activities.

These malware families can install backdoor trojans on your computer, which allow criminals to steal your information, such as your passwords, and use your computer to collect other sensitive information. For example, Bladabindi can take snapshots and record videos without your permission. It can also control your system remotely.

These backdoor trojans can also upload new components or malware to your computer to add more malicious functionality. They often communicate with hosts that are typically a Dynamic DNS service such as NO-IP because this makes them more difficult to trace.

The malware families spread primarily through social engineering techniques. For example, Bladabindi can take snapshots and record videos without your permission. It can also control your system remotely. Bladabindi also plants files with enticing names and icons on removable media and linked drives to lure new victims.

Most Jenxcus infections occur through torrents and websites when the malware is bundled with other programs or videos. Jenxcus also tries to trick you into installing it by pretending to be a Flash update that you need to install before watching a video. After infecting a computer, Jenxcus leaves enticing shortcut files on removable media that look like songs or other personal files. When opened these files run a copy of the malware.




Previous
Next
New Samsung 850 PRO SSD Is Powered by 3D V-NAND        All News        Xbox One Achievements Coming Soon to Xbox.com
Fujitsu Buys Shares of Panasonic Information Technology Solutions     General Computing News      Google To Discontinue Orkut

Get RSS feed Easy Print E-Mail this Message

Related News
FBI Cleanups GameOver Zeus, Cryptolocker Botnets
FBI Says BlackShades Infected Half Million Computers
Windows Malware Infects Android Devices
Malware Attack Strikes Asian, European Governments
Dropbox, WordPress Used To Spread Malware
Mobile Threats Continue Rampant Growth
Cyber Attack Targets Nato, Government Websites
Stuxnet Roots Found Back in 2005
Android Malware Found On Google Play
July 9 Could be 'Internet doomsday' for Some PC or Mac Users
Kaspersky Says Stuxnet and Flame Developers Are Connected
Google Starts Showing Security Warnings For Suspected State-sponsored Attacks

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .