Featured news
Microsoft recently spotted a considerably versatile social engineering campaign used to trick Facebook users into installing a particularly nasty backdoor Trojan with keylogging capabilities. The messages used to lure in users vary, but they all lead to fake YouTube pages:

Once there, the user is urged to download a new version of "Video Embed ActiveX Object" in order to play the video file.
Unfortunately, the offered setup.exe file is the Caphaw Trojan, which bypasses firewalls, installs an FTP and a proxy server and a keylogger on the affected machine.
"It also has built-in remote desktop functionality based on the open source VNC project," says Microsoft's Mihai Calota. "We received a report that a user found this in his computer and also discovered that money had been transferred from his bank account by an unknown party. The keylogging component, coupled with the remote desktop functionality, makes it entirely possible for this to have happened."
He advises all users to update their AV software and scan their computers, and to change the passwords on all their sensitive accounts. In case they have noticed a similar campaign taking advantage of a friend's account, the should warn him personally and Facebook by using the "report/mark message as spam" option.

Spotlight
Researchers map out hard-to-kill, multi-layered spam botnet
A dropper component sent to the Akamai researchers led them to the discovery of a spamming botnet that consists of at least 83,000 compromised systems.
Open source KeeFarce tool loots encrypted passwords stored in KeePass
A researcher with security consultancy Security-Assessment.com has released the source code for KeeFarce, a tool that can export all information stored in the database of a user's KeePass password manager.
Nearly 2% of all smartphones are compromised or high risk
Risks increase over time. In one month, about 22 percent of devices will encounter network threats, with that number jumping to 40 percent over the following three months. The majority of devices are not equipped to fight these threats.
US DOJ admits that Stingrays can be used to intercept call and SMS content
The American Civil Liberties Union of Northern California has emerged victorious and has been given access to documents that spell out the details about the US federal government’s use of Stingrays surveillance devices.
New DDoS attacks misuse NetBIOS name server, RPC portmap, and Sentinel licensing servers
Akamai has observed three new reflection DDoS attacks in recent months: NetBIOS name server reflection, RPC portmap reflection, and Sentinel reflection.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.
