This malware is constantly ranked in the TOP 5 malware in AhnLab ASEC analysis team’s ‘weekly malware statistics,’ statistics that are uploaded weekly. As displayed in the statistics, AgentTesla is very active in Korea. As shown in Figure 1, the malware of this type is attached to an email. 220, Pangyoyeok-ro, Bundang-gu, Seongnam-si, Gyeonggi-do, Korea. Tel +82 31 722 8000. Fax +82 31 722 8000. Google Map Email Inquiries.
SEOUL, South Korea--(BUSINESS WIRE)--AhnLab, a leading provider of integrated security solutions, today unveiled its Top 10 Security Threats in the first half of 2011
“Threats to mobile and online security are constantly becoming more sophisticated,” said Mr. HongSun Kim, CEO of AhnLab. “Therefore, it is essential to remain alert and aware of growing online trends and threats in holistic viewpoint. AhnLab provides insight into the latest online threats so that all stakeholders can take measures for protection.”
Social Network Services as Malware Path Minitool partition wizard 12 pro full key.
In its findings, AhnLab emphasizes that 2011 is the year of social networking services. These services are considered a useful and popular means to connect with networks and relay messages to broad audiences. In the same vein, these sites have proven beneficial to malware paths. More specifically, a trend whereby attackers distribute malware through dominant social networking sites, such as Twitter and Facebook, has become more prominent. Attackers tend to disseminate malware by using shorted URLs connected to popular issues such as the tsunami in Japan and Osama Bin Laden’s death.
Malicious Codes Hacking Corporations
Attacks aimed at corporations were also seen on the rise during the first half of 2011. These types of attacks are known as advanced persistent threats, or APT. APTs were observed in February of 2011 when oil and energy companies were targeted and attacked by the cyber threat, ‘Night Dragon.’ In April of this year there was a conflict between hacker groups including LulzSec and Anonymous, companies targeted included: Sony, Lockheed Martin, and even the FBI. The AhnLab also notes that attackers have recently tended to express their political and social opinions through their hacking, and this movement has been called ‘Hacktivism’.
Growing Menace to Online Banking
As the main objective of most malware attackers is in increasing profit, the rising risk to online banking. More specifically, AhnLab observed in the first half of 2011 an increase in the stealing of financial information. There were two developments with Trojan malware in the first half of the year: Banker Trojan and Zeus Trojan. In May, Banker Trojan malware, which is designed to export financial data during online banking, was identified in Korea. Additionally, the Zeus Trojan source code, the most severe online banking malware created, was leaked. With this leaked source code, attackers generated many Zeus variants.
Increased Mobile Malware
AhnLab also highlights an increase in the number and sophistication of mobile malware. In the first half of 2011, a premium rate calling Android malware was identified. More specifically, this malware sent SMS to other phone numbers. Besides, Zft, forced rooting tool, KidLogger that stealing call, text and internet history, DroidKungFu that remote controls the victimized cell phone are also found. AhnLab warns that the installed malware performs tasks given by the attackers, and attackers will continue to find more ways to infect mobile devices.
Fake Antiviruses Become Harder to Identify
Rounding up the ten greatest security threats, the AhnLab notes that fake antivirus software has become more difficult to identify. In January of 2011 ASEC reported the fake antivirus program disguising as the famous ‘AVG Anti-Virus 2011.’ In April, the fake antivirus program appearing as BitDefender 2011 was also identified. This fake antivirus has the same-looking user interface and logo. Like other antiviruses, once installed, the rogue BitDefender automatically scans the system and triggers false alerts claiming user PCs have security issues and infections that require removal.
Increased Number of Malicious Codes Patching Windows
In the first half of 2011, AhnLab observed an increase in the number of malicious codes patching windows system files. Malware that steals online game accounts by patching imm32.dll, ksuser.dll, midimap.dll and compres.dll files were identified. Some malicious codes deliver cyber attacks that bring forced closing of antivirus and/or Windows services by switching or deleting normal system files. In fact, these kinds of codes are designed to damage the operating system when detected and deleted by antivirus services.
Smarter Online Game Hacking
In the first half of 2011, game hacking has risen sharply and become more acute. In fact, as of June 2011, game hacking tools increased by 300 percent compared to the same period in 2010, from 1,068 to 4,050. Hacking tools for online games bring about unfair results by modifying user data in the memory, game file and server, and by also installing an auto play cheat. Data memory modification is becoming more popular over traditional code modification, and auto play cheating uses a specific action function as opposed to mouse and keyboard codes. AhnLab stipulates that 2,575 memory modification tools and 1,274 auto play tools were identified.
Increased Threat to Mac OS Users
Although Mac OS users have generally been considered relatively safer than Windows users, AhnLab found that Mac OS users are vulnerable to greater risks. AhnLab also notes that this trend is rising in conjunction with the increased number of Mac and iPhone users. In fact, in May of this year, the fake antivirus application, MAC defender, was spread throughout Twitter. Upon installation by Mac users, this application infected the system. The latest ASEC report warns that Mac users should be particularly careful not to open any links sent by unknown users.
Spam Mails with Malicious Codes
Spam mails with malicious codes were also on the rise in 2011, particularly in the second quarter. AhnLab observed the trend whereby mail disguises itself as either a Facebook password reset, or a FedEx or UPS invoice. AhnLab also notes a rise in malicious mails disguised as ‘credit card maxed out’ warnings, which direct victims to run corrupted files. In most cases, these malicious mails attempted to install fake antivirus programs.
Ahnlab Korea
Malicious Codes Spread Through Web Application Vulnerability
Malicious codes exploiting web application vulnerability were also a noted as a security in the ASEC Report. In the 1st quarter of 2011 the following vulnerabilities were exploited: MS11-003: Internet Explorer; MS11-006: Windows OS; CVE-2011-0609: Adobe Flash Player. In the 2nd quarter, CVE-2011-0609 was found again in PDF form, and another Adobe Flash Player vulnerability, CVE-2011-0611, was also found. In June, CVE-2011-2110 from Adobe and MS11-050 from MS were exploited for the diffusion of malware. AhnLab advises that all users update the latest patches for all software including Windows and Adobe, to prevent victimization.
For more information on the latest security threats through the first half of 2011, please visit (http://globalblog.ahnlab.com)
About AhnLab, Inc.
Ahnlab South Korea
Headquartered in South-Korea, AhnLab Inc. (KSE: 053800) develops industry-leading security solutions and provides professional services that are designed to secure and protect critical business and personal information. As a leading innovator in the information security arena since 1988, AhnLab's cutting edge products and services have been fulfilling the stringent security requirements of both enterprises and individual users. AhnLab’s products and services include anti-virus solutions, network, mobile and online game security, security management and consulting services. Today, AhnLab boasts a network of sales and research operations in more than 20 countries worldwide.
Have Questions?
Ahnlab Korea
FAQs
Get answers to frequently asked questions about V3 Home.
- V3 Home is a security solution for home IoTV3 Home is a security solution for home IoT devices. By connecting V3 Home to the router you use at home, V3 Home can monitor entire network traffic of all devices connected to the router. devices.
- Yes, we only collect metadata (small portion of packet) of the network traffic via encrypted 'secure channel'. We need those information fed into the AI engine to determine the malicious activity. However, any user sensitive data is trimmed and is not collected at all.
- V3 Home will work for you regardless of the region but make sure that you need to have a router to connect.
- 4
Do I need V3 Home devices as many as IoT devices to protect?
No, it doesn’t matter how many IoT devices you use but the router. If you are using 100 IoT devices connected to a single router, you need just one V3 Home device. However, if you use multiple routers at home, you need to setup V3 Home devices for each router. - No, it doesn't have routing feature with it now. We have plan to add routing feature in the near future.
- 6
Do I need to install an application on every device?
There is no need to install additional application on your IoT devices to protect them and this is why V3 Home is needed. Even with V3 Home you still need antivirus software to protect your PC because the ability of these solutions are totally different. However you can't use antivirus software on the IoT devices like IP camera or smart refrigerator. - Currently It doesn't but in the future, it may because the Key Features of V3 Home such as IP filtering based on the blacklist or archiving the security logs cost for the maintenance just like antivirus software.
- Your serial number is located on a label on the back of the product, under the LAN port.