Tag Archives: clutterfreepc.com

Clutterfreepc news: British Royal Navy Attacked!

Direct from clutterfreepc:

The British Royal Navy has been successfully attacked – by malware.

The Royal Navy’s website was recently shut down temporarily while military officials repaired the vulnerability. In addition to the website’s motto, which ironically reads “Modern and Relevant,” users saw a message telling them why they couldn’t access any information on the website during repairs.

“Unfortunately the Royal Navy website is currently undergoing essential maintenance. Please visit again soon,” the website read.

Meanwhile, in true cyber criminal fashion, the hackers responsible for the attack celebrated and boasted on anonymous blogs throughout the web. A cyber criminal known only by the moniker TinKode took credit and received praise for the attack.

“TinKode doesn’t need sophisticated weapons to disarm an army. He just need a PC,” an anonymous post on TinKode’s blog read.

Another hacker gave him a pat on the back. “Nice dude, really nice. Good job,” a hacker name Sirarcane added.

Cyber security authorities across the globe have discussed the implications that may come as a result of the attack on the British Royal Navy’s website. Graham Cluley, senior technology consultant for security firm Sophos, said the event is “embarrassing” for the British military’s cyber security, and said the country is fortunate TinKode didn’t use the hack for more malicious purposes.

“We can all be thankful that Tinkode’s activities appear to be have been more mischievous than dangerous,” Cluley wrote in a recent NakedSecurity blog post. “If someone with more malice in mind had hacked the site they could have used it to post malicious links on the Navy’s JackSpeak blog, or embedded a Trojan horse into the site’s main page.”

In fact, TinKode, who is believed to live in Romania, has a history of pointing out glaring web security flaws within networks that many users may have previously considered secure. According to Clulely, “TinKode has revealed security holes in NASA’s website, and published information about SQL injection vulnerabilities in sites belonging to the U.S. Army.”

Just as government cyber security has rebounded from these past attacks, Cluley hopes the British Royal Navy can limit the damage from TinKode’s attack and use it to prevent future issues.

“Hopefully efforts are in place now to secure any vulnerabilities and reduce the chances of such a serious security breach happening again in the future,” Cluley wrote. “It is to be hoped that the ultimate impact of this attack will be egg on the face of the Ministry of Defense – and better security practices in the future – rather than a more significant assault on a website presenting the public face of an important part of the armed forces.”

A number of other recent attacks have highlighted the importance of anti-malware software in government networks, including the Stuxnet virus’ successful infiltration of Iran’s energy infrastructure.

If the British Royal Navy can be attacked, anyone can!  To protect your PC, please visit ClutterFreePC at www.clutterfreepc.com.




Ascentive Alert: Beware of Scareware Scams!

A High-Priority Alert From Ascentive:

Cyber criminals are flocking to scareware scams. Recent research has found 40 percent of all false anti-malware solutions in the wild were created this year.

PandaLabs’ research found more than 5.6 million scareware scams in the wild. Nearly 2.3 million of these were launched between January and October of this year. Scareware, also known as rogueware, has only been known on the internet for four years, signifying a sudden jump in the trend, as cyber criminals continue to look for new ways to target unsuspecting PC users.

Rogueware’s rapid growth has propelled it into a much higher saturation in the overall malware market. According to the research, 46.8 percent of all computers were infiltrated by malware. Rogueware accounted for 10 percent of these infected devices.

These attacks are relatively sophisticated, with fake antivirus brands and formats designed to keep users from ever second-guessing their legitimacy. Specifically, the most successful scareware programs found in the study were SystemGuard2009, MSAntiSpyware2009 and MalwareDoctor, at 12.5 percent, 11.7 percent and 8.1 percent of the market, respectively. When users are presented with these programs, they generally trust them and, with their computer’s security in mind, download them willingly.  Reputable brands such as Ascentive‘s own Clutter Free PC and FinallyFast are fighting to catch malware scams wherever they hide, and it is a constant battle to defend against new attacks. However, these scams don’t stop here.

“Once they have infected a system, these applications try to pass themselves off as antivirus solutions that have detected hundreds of threats on the user’s computer,” PandaLabs explained in a recent release. “When the user attempts to remove the threats using the fake antivirus solution, they are asked to purchase the ‘full’ product license. Unfortunately, many people panic when they see this message and fall for the bait. Once they ‘buy the license,’ they will of course never hear from the ‘seller’ again, and the fake antivirus is still on their computer.”

The sudden popularity of rogueware scams may be a result of its widespread success. According to PandaLabs, rogueware has generated millions of dollars in revenues for the cyber criminals that create them. Not only do rogueware scams trick users into voluntarily loading malware onto their computers, they also persuade them to submit their credit card information. As result, cyber criminals are giving a computer through which they can further spread their scam, and can use the stolen credit card information to make purchases in the meantime. All the while, the user is under the impression that they purchased a legitimate security solution.

Worse still, fear of complex scareware scams may prevent consumers from protecting themselves against the very malware they most fear.  A representative at Clutter Free PC told us that disreputable companies have actually harmed consumers by making them frightened of all anti-malware software.  The results are chilling. 

Rogueware campaigns have recently made headlines. In order to prevent an infection, security experts advise users stick to trusted antivirus sources, regardless of the information presented by a lesser-known, potentially malicious antivirus provider.

%d bloggers like this: