Featured news
DevilRobber, the latest Trojan to target Mac users, got updated.As you may remember, the previous incarnation stole Bitcoins from the user's wallet file, used the computer's resources to mine Bitcoins for the malware author, stole login credentials, browsing histories, the history of commands run in the Terminal and data regarding the use of Truecrypt software and TOR, and opened a backdoor into the system.
It came bundled with the popular GraphicConverter app, and would fail to install if the user has Little Snitch installed on his computer.
F-Secure researchers point out that the newly discovered Trojan is the third iteration of the malware (as indicated by its dump.txt file), and that it poses as the popular image-editing app PixelMator.
"The main point of difference in DevilRobberV3 is that it has a different distribution method — the 'traditional' downloader method," they say. "The DevilRobberV3 sample that we analyzed is an FTP downloader that will download its backdoor installer package from an FTP Server service provider."
This version of DevilRobber does not check if Little Snitch is installed before attempting to install itself, and it doesn't take screenshots. But, it has other features that the original version is lacking - it tries to harvest the shell command history, the system log file and the contents of 1Password, the popular software for managing passwords.
Unfortunately, its Bitcoin mining and stealing capabilities are still there, as well.

Spotlight
Researchers map out hard-to-kill, multi-layered spam botnet
A dropper component sent to the Akamai researchers led them to the discovery of a spamming botnet that consists of at least 83,000 compromised systems.
Open source KeeFarce tool loots encrypted passwords stored in KeePass
A researcher with security consultancy Security-Assessment.com has released the source code for KeeFarce, a tool that can export all information stored in the database of a user's KeePass password manager.
Nearly 2% of all smartphones are compromised or high risk
Risks increase over time. In one month, about 22 percent of devices will encounter network threats, with that number jumping to 40 percent over the following three months. The majority of devices are not equipped to fight these threats.
US DOJ admits that Stingrays can be used to intercept call and SMS content
The American Civil Liberties Union of Northern California has emerged victorious and has been given access to documents that spell out the details about the US federal government’s use of Stingrays surveillance devices.
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers
Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.
