It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by booda
My task this week has been to identify PC's that have been subjected to a Adober reader vulnerability. A trojan seems to infect PC's that have not been updated to the latest version of Adobe reader. One of the tojans is called crazybadegg.pdf. A lot of legit sites have this trojan embedded and when a user opens a PDF file it then attacks the machine. Malwarebytes and Microsoft essentials does a good job of getting rid of it and we then patch the reader to stop it happening again...
Originally posted by mikelee
reply to post by 12GaugePermissionSlip
Buy a Mac and be done with all that hassle
Originally posted by SkepticOverlord
After some testing of competing services (and some price negotiations, this ain't cheap), we've zeroed in on a firm who will very-soon begin long-term proactive scanning of all the ads that appear on ATS,
Originally posted by Ha`la`tha
Just what can the Adobe reader do to the machine other than auto-update (not via pdf information) and read PDF files?
LuckySploit tries to exploit the same vulnerabilities other toolkits are trying to - Adobe Flash and PDF exploits
Here’s how it works. First, as we have seen with many other crimeware toolkits, a user is visiting a compromised website and is being redirected (using IFRAME or other techniques) to a server armed with LuckySploit. All is invisible to the user’s eyes and happens “behind the browser scene”.
The first LuckySploit’s malicious page that is sent to the user’s browser contains a moderately obfuscated JavaScript code. The code is created at runtime with random variables and functions names. This part is used to construct the “brains” of the toolkit – an asymmetric key encryption and decryption.
(snip)
This dynamic technique makes it almost impossible to do an offline (or post-infection) analysis of the toolkit and the served malicious code, since the key used by the client is not available. On every round a new key is generated.
This toolkit is a great example for the sophistication, time and efforts that toolkit makers are investing in to make their “Swiss knife” undetectable for security products.
Originally posted by A-Dub
I also made a malware report about it btw
Originally posted by A-Dub
well if you guys got that contract to have your ads scanned I suggest you cancel it because my WORK COMPUTER (with a lot of protection) just got the "Antivirus Soft" malware from ATS!