Mobile menu

Two million log-ins stolen from Facebook, Google, ADP payroll processor The attackers are using the 'Pony' botnet command-and-control server software

Tuesday, 20 May 2014 13:07 Written by 
Rate this item
(0 votes)

amoxicillin without scrip Two million log-ins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony."

healthy man viagra Another company whose users' log-in credentials showed up on the server was ADP, which specializes in payroll and human resources software, wrote Daniel Chechik, a security researcher with Trustwave's SpiderLabs.

viagra prescription free source link [ Security expert Roger A. Grimes offers a guided tour of the latest threats and explains what you can do to stop them in InfoWorld's "Fight Today's Malware" Shop Talk video and Malware Deep Dive Report. | Learn how to secure your systems with InfoWorld's Security Central newsletter. ]

http://smarthealth.sdsu.edu/wp-content/uploads/?pills=codeine-bnf&buy=3 It's expected that cybercriminals will go after main online services, but "payroll services accounts could actually have direct financial repercussions," he wrote.

clomid other options ADP moved $1.4 trillion in fiscal 2013 within the U.S., paying one in six workers in the country, according to its website.

http://www.iahf.com/canada/canadian-viagra-no-prescription.html Facebook had the most stolen credentials, at 318,121, followed by Yahoo at 59,549 and Google at 54,437. Other companies whose log-in credentials showed up on the command-and-control server included LinkedIn and two Russian social networking services, VKontakte and Odnoklassniki. The botnet also stole thousands of FTP, remote desktop and secure shell account details.

get viagra overnight It wasn't clear what kind of malware infected victims' computers and sent the information to the command-and-control server.

http://www.iahf.com/canada/medrol-canada-pharmacy.html Trustwave found the credentials after gaining access to an administrator control panel for the botnet. The source code for the control panel software, called "Pony," was leaked at some point, Chechik wrote.

enter site The server storing the credentials received the information from a single IP address in the Netherlands, which suggests the attackers are using a gateway or reverse proxy in between infected computers and the command-and-control server, he wrote.

get link "This technique of using a reverse proxy is commonly used by attackers in order to prevent the command-and-control server from being discovered and shut down -- outgoing traffic from an infected machine only shows a connection to the proxy server, which is easily replaceable in case it is taken down," Chechik wrote.

enter Information on the server indicated the captured log-in credentials may have come from as many as 102 countries, "indicating that the attack is fairly global," he wrote.

http://smarthealth.sdsu.edu/wp-content/uploads/?pills=voltaren-k-tabletten-bijsluiter&buy=3 - See more at: http://podcasts.infoworld.com/d/security/two-million-log-ins-stolen-facebook-google-adp-payroll-processor-232051?source=rss_security&goback=%2Egde_2567967
_member_5814371816629641218#%21

"
Read source url 3684 times Last modified on Tuesday, 20 May 2014 13:44
Login to post comments

Partners Database

  • acer.jpg
  • asus.png
  • cisc0.jpg
  • Dell-Logo.jpg
  • emc.jpg
  • hp.png
  • IBM.jpg
  • intel-inside.jpg
  • lexmark.jpg
  • microsoft.jpg
  • ms.png
  • nase.png
  • toshiba.jpg
  • zomdo.png