The Weekly Top 3 are the three most relevant news stories for the week that are related to phishing scams and activities reported in the media, security blogs and security magazines on the Internet. This week, we look at phishing activities related to Adobe, Edinburgh Council and Zeus (not the God of Thunder).
New Phishing Scam Targets Users Adobe Flash
An APT hacking group by the name of Wekby has been reported as using phishing e-mails to exploit a zero-day bug found in Adobe Flash. Security researchers stated that spear phishing e-mails were sent to their intended victims, indicating that they needed to download and update their Adobe Flash. The e-mail contained a malicious link that would forward the victim to a website containing a ‘.swf’ file that exploits the Adobe Flash Player. This exploit allows the hacker group to execute commands on the victim’s computer and allows for further remote access to the computer. Click the link below to read more.
Thousands Of E-mail Addresses Stolen In Edinburgh Council Cyber Attack
The Edinburgh City Council stated earlier this week that hackers were able to obtain over 13,000 e-mail addresses from their computer systems. They have indicated that no other personal information was stolen during the cyber attack. The hackers gained access by bypassing the security of one of their web service providers. They are expecting that users will get an increase in phishing e-mails as a result, but have asked users of the Council’s website to change their passwords. This is to ensure that the hackers do not gain access their online account. Click the link below to read more.
Zeus-like Dyre Malware Will Scam ‘At Least’ One In 25 UK Bank Customers
Bank customers in the United Kingdom have been warned of a major phishing campaign by hackers that makes use of the Dyre malware to steal financial information. Security researchers from BitDefender stated that almost 20,000 customers were targeted. The cyber criminals use compromised servers to send phishing e-mails with the Dyre banking trojan. Once a victim has allowed the malware to install itself on their computer, it waits still the user logs into the online banking website of a well known bank. Using malicious code, the malware will inject this code into the browser and covertly steal credentials, and manipulate user’s accounts. Click the link below to read more.