trojans

Workplace Security: Are You the Weakest Link?

As an employee at some company somewhere, you are probably putting your organization at risk every day – and you don’t even know it.  Do you re-use the same password to log in to multiple accounts?  Are you visiting social networking sites and planning your upcoming summer vacation while at work?  Have you ever logged…

The eDead Trojan: A Synopsis of Geo-Targeted Spyware

While RSA FraudAction Research Labs does not usually focus on pure-play spyware, which is solely interested in users’ keyword searches and browsing habits, over the past year, the Lab has repeatedly detected and handled strains of malware called the eDead Trojan[1]. This highly-targeted spyware code was developed for the sole purpose of collecting keyword search…

Online Dating, Online Fraud: It’s All Relative

To me, online dating these days is not much different than online fraud.  I speak from personal experience on both – as someone who has experienced the thrills of online dating sites (NOTE sarcasm here) and has the privilege of witnessing the latest online scams that fraudsters pull on a daily basis.  I live in…

Man-in-the-Middle For Hire

By Limor S Kessem, Cybercrime and Online Fraud Communications Specialist, RSA Discussion and buzz about the burgeoning Fraud-as-a-Service (FaaS) trend in the cybercrime economy is as constant and as progressive as it gets. New FaaS offerings are only limited to the imagination of the dubious actors who offer them, and as such, are often creative…

Gone Phishing and Mining! Phishers leverage Web Analytics to Refine Attacks

By Mor Ahuvia, RSA FraudAction Research Lab Phishers, botmasters and underground vendors are increasingly adapting business models and tools for their nefarious ventures. Botmasters are creating and selling blacklists to ward off research and shutdown attempts by infosec experts and law enforcement. Underground vendors transact with buyers using in-house or publicly available escrow services, and…