A Week in Security (Feb 15 – 21)

| February 23, 2015
A Week in Security (Apr 05 - 11)

Last week, our experts found Web threats involving popular names in technology, gaming, media, and the adult entertainment.

Security Researcher Christopher Boyd encountered fakeouts festooned all over YouTube, claiming to activate Windows 10, the latest OS from Microsoft. Most of the activation tools were detected as PUPs.

Boyd also found rogue tweets on Twitter baiting whoever is interested in Evolve, the new, highly anticipated co-op published by 2K Games, of a certain cheat file called Evolve PC Monster FireHide Hack v1.0. It is actually a Trojan that MBAM detects as Trojan.MSIL.Agent.

Speaking of games, Security Researcher Jovi Umawing discovered a quite rare phishing campaign that targets accounts of Japanese gamers who have profiles under Square Enix. The phishers specifically used Dragon Quest X as lure.

Senior Security Researcher Jérôme Segura came across an infection via malicious code injection on the official website of renowned British celebrity chef, Jamie Oliver. Segura found that visiting the site launches exploits targeting vulnerabilities on Adobe Flash, Silverlight, and Java.

Segura also touched on Superfish, the infamous software that comes installed on certain Lenovo laptop models at a certain time. He also provided solutions for users with affected hardware to refer to in order to safely remove the file and its certificate from their systems.

Lastly, the Malwarebytes Labs team unearthed a compromise on RedTube, a top adult entertainment site. It was injected with a rogue iframe that directs visitors to the download and execution of an Angler exploit kit variant. The said EK targets Flash and Silverlight vulnerabilities.

Notable news stories and security related happenings:

Safe surfing, everyone!

The Malwarebytes Labs Team

About the author