Matthew Hines

Sizing Botnets No Exact Science

After leading a concerted effort shut down the notorious Mega-D botnet (aka Odzok), researchers with FireEye are trying to estimate the size of the massive fleet of zombie machines, which is an interesting art in and of itself. After doing some detailed research into the operation of Mega-D, which was known for its ability to […]

Unified Creeps: Cyber-crime to Rage on in ’10

Typically you’ve got to wait until at least December to begin seeing security researchers’ foreboding predictions for the malware and unethical hacking landscape in the next year to come. However, in keeping with the theory of unified cultural creep, or the increasingly invoked notion that supports the strange reason why we’ve begun to see Christmas […]

Online IT Security Drama: Reality or TV?

People who work in the health care field always seem to cringe when they hear others talk about watching popular hospital dramas like “ER” on TV, and, upon questioning, will typically offer that such shows either aren’t very realistic or actually remind them too much of their real, grisly work to be much fun to […]

Malware SEO: Gaming Google Trends and Big Bird

Malware distributors continue to flex their abilities to tap into whatever’s hot in terms of search engine activity, even on a daily basis. We’ve grown accustomed to the idea that whenever there is a major news item worldwide, from natural disasters to celebrity gossip stories, attackers will be hot on the heels of legitimate reports […]

Facebook Campaigns Serve Up Nasty Cocktail

Anyone with a busy e-mail in-box has likely noticed the dramatic uptick in Facebook-related phishing campaigns making the rounds over the last several weeks. Waves of the threats are surging across the Web daily, encouraging users to click on an attachment based on their need to update their Facebook log-in information. For people like myself […]

Inside the Elite Control Botnet

Researchers with Trend Micro’s TrendLabs group have gotten their hands on the code behind the dangerous “Elite Control” botnet, allowing for a closer look at the attack’s underpinnings and capabilities. TrendLabs Advanced Threats Researcher Maxim Goncharov detailed his findings in a recent blog post after coming across a free copy of the botnet’s source code […]

New DHL Notice Campaigns Deliver Backdoor Threat

Researchers with BitDefender are tracking the emergence of a new spate of phony overnight delivery notice attacks, calling out a set of threats currently in circulation that attempt to create backdoors that leave affected machines almost completely under the control of their assailants. The attacks also utilize popular rogue AV scanner techniques to further entrap […]

Cyber-Protesters Hoist New Signs of Innovation

Online “hacktivism” continues to expand and diversify as protesters find new ways to use the electronic realm to display their support or displeasure for offline politics, and researchers with anti-botnet specialists Damballa are following the maturation of some new models for cyber-protesting that they’re citing as fairly impressive in terms of their overall advancement of […]

Inside the Clampi Trojan: Using Shellcode to Game Firewalls

Many of today’s Trojan malware threats utilize sophisticated techniques to circumvent firewall technologies and communicate with their distributors and/or controllers, but researchers with Symantec have peeled back the layers on the widespread Clampi attack to reveal a particularly innovative approach to defeating such defensive mechanisms. In a recent blog post, Symantec researcher Nicolas Falliere detailed […]

Botnet Click Fraud Problem Growing

Researchers who specialize in tracking the use of automated programs and other means to commit click fraud — or the illegitimate inflation of online ad traffic for the purpose of boosting profits — are pointing to the increased use of botnets by scammers seeking to line their pockets via ill-begotten trade. Click Forensics, which has […]