The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
01/02/2015

W32.Tempedreve

Type:  Worm
Discovered:  02.01.2015
Updated:  02.01.2015
Affected systems:  Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

When the worm is executed, it creates the following files:
  • %UserProfile%\Application Data\[RANDOM FOLDER NAME]\[RANDOM FILE NAME].exe
  • %Windir%\System32\[RANDOM FILE NAME].exe
  • %DriveLetter%\Temp.exe
  • %DriveLetter%\Temp.exe
  • %UserProfile%\Local Settings\Temp\~[RANDOM FILE NAME].tmp

The worm then drops the following file, which may contain a fake invoice document:
  • %UserProfile%\Local Settings\Temp\~[RANDOM FILE NAME].tmp.pdf

The worm then creates the following registry entries:
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\Security\"Security" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"Type" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"Start" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"ObjectName" = "LocalSystem"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"ImagePath" = "expand:[PATH TO MALWARE] -s"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"FailureActions" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"ErrorControl" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"DisplayName" = "[RANDOM KEY NAME]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"Description" = "[RANDOM KEY NAME]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"DependOnService" = "RPCSS\00\00"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[RANDOM KEY NAME]\"DependOnGroup" = "\00"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[RANDOM KEY NAME]\0000\"Service" = "[RANDOM KEY NAME]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[RANDOM KEY NAME]\0000\"Legacy" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[RANDOM KEY NAME]\0000\"DeviceDesc" = "[RANDOM KEY NAME]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[RANDOM KEY NAME]\0000\"ConfigFlags" = "[BINARY DATA]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[RANDOM KEY NAME]\0000\"ClassGUID" = "[CLSID KEY]"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[RANDOM KEY NAME]\0000\"Class" = "LegacyDriver"
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[RANDOM KEY NAME]\"NextInstance" = "[BINARY DATA]"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM KEY NAME]" = "[PATH TO MALWARE]"

Next, the worm connects to the following remote locations:
  • http://[RANDOM DOMAIN]/pki/mscorp/crl/MSIT%20Machine%20Auth%20CA%202(1).crl
  • http://[RANDOM DOMAIN]/pki/mscorp/crl/msitwww2.crl

The worm may then spread through removable and network drives.

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015