{"id":2430,"date":"2013-02-01T00:00:00","date_gmt":"2013-02-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/01\/news-briefs-the-latest-breaches-malware-and-hacktivist-activities-sc-magazine\/"},"modified":"2021-12-30T11:41:20","modified_gmt":"2021-12-30T11:41:20","slug":"news-briefs-the-latest-breaches-malware-and-hacktivist-activities-sc-magazine","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/01\/news-briefs-the-latest-breaches-malware-and-hacktivist-activities-sc-magazine\/","title":{"rendered":"News briefs: The latest breaches, malware and hacktivist activities &#8211; SC Magazine"},"content":{"rendered":"<p>The botnet is grown when users unwittingly install a malicious game app that contains the SpamSoldier trojan \u2013 malware capable of blocking incoming and outgoing texts from unknown numbers in case users or mobile service providers try to alert victims of their spamming. RSA researchers found that Carberp perpetrators began offering the trojan again in December; it had been sold last in February 2011 in closed online forums for $10,000.   The botnet, among the world&#8217;s largest banking networks detected at that time, was believed to have caused $4.5 million in loses as of 2011, primarily impacting users in Russia.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The campaign, part of a distributed denial-of-service (DDoS) operation that began last fall, is being led by the Martyr Izz ad-Din al-Qassam Cyber Fighters, which said it staged the attacks in protest of anti-Muslim film, Innocence of Muslims. &#8230;  On Dec. 21, the Office of the Comptroller of the Currency (OCC), a regulating body for national banks, issued an alert about the apparent uptick in DDoS attacks being waged in the industry.<\/p>\n<p>Link: http:\/\/www.scmagazine.com\/news-briefs-the-latest-breaches-malware-and-hacktivist-activities\/article\/276469\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2430","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2430"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2430\/revisions"}],"predecessor-version":[{"id":4917,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2430\/revisions\/4917"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}