• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

ToolShell under siege: Check Point analyzes Chinese APT Storm-2603

 | 

CISA released Thorium platform to support malware and forensic analysis

 | 

Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware

 | 

Dahua Camera flaws allow remote hacking. Update firmware now

 | 

Researchers released a decryptor for the FunkSec ransomware

 | 

Apple fixed a zero-day exploited in attacks against Google Chrome users

 | 

PyPI maintainers alert users to email verification phishing attack

 | 

FBI seizes 20 BTC from Chaos Ransomware affiliate targeting Texas firms

 | 

Critical SAP flaw exploited to launch Auto-Color Malware attack on U.S. company

 | 

Orange reports major cyberattack, warns of service disruptions

 | 

Hackers leak images and comments from women dating safety app Tea

 | 

Pro-Ukraine hacktivists claim cyberattack on Russian Airline Aeroflot that caused the cancellation of +100 flights

 | 

Seychelles Commercial Bank Reported Cybersecurity Incident

 | 

Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

 | 

U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover

 | 

Scattered Spider targets VMware ESXi in using social engineering

 | 

China-linked group Fire Ant exploits VMware and F5 flaws since early 2025

 | 

Allianz Life data breach exposed the data of most of its 1.4M customers

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber Crime
  • Cyber warfare
  • Malware
  • Social Networks
  • Underestimate the threat, a serious error

Underestimate the threat, a serious error

Pierluigi Paganini February 04, 2012

In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage.
The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this social media represent a privileged factor. For this reason, governments and institutions are promoting and supporting the processes of monitoring and surveillance of social networking.

To ensnare the user through the social networks are proposed sensational breaking news, but beware of malware lurking. Recently a huge number of Facebook users have found status messages today claiming that the United States has attacked Iran and Saudi Arabia.
Trying to visit the proposed link the user is redirect to fake website of the main journals that report the news. In this instant the trap begin, incfact clicking on the video thumbnail the page request to the user to install or update components like Adobe Flash player. This kind of message are a really familiar for user that are are misled. Company names like Adobe or Microsoft do not arouse suspicion and cause the user to follow the procedures described in the pop up malicious.

In this way the malware gains the access to the pc of the victim’s pc. Sophos Firm has alerted its customers regarding the threats of the agents Troj/Rootkit-KK that drops a rootkit called Troj/Rootkit-JV onto your Windows systems and also of the malware known as HPsus/FakeAV-J.that create a fake explorer.exe process.

I started this article by focusing on the military scope and I ended up moving to aspects regarded playful social networks. One commits an unforgivable error if the areas are approached separately, the threat is dangerous and in any case deserves the same attention no matter its origin. We have assisted in more than one occasion to accidents caused by improper use of social networks and mobile storage devices, used as vectors to inoculate malware in military areas. Material defense, aerospace stations, and more generally any critical infrastructure is at risk.
The malware polymorphic of the latest generation are able to exploit 0-day vulnerabilities and sometimes to combine mutually accidentally generating a dangerous offensive from which to defend is not simple. These agents, once infected the victim, live by themselves, they can remain silent and steal information, they can in turn be distributed independently user action spreading itself to victim’s contacts, they can infiltrate sensitive systems.
Do not be deceived so that a scareware is a threat to distracted kids playing on social networks … there is much more at stake.
Pierluigi Paganini


facebook linkedin twitter

Botnets Content filtering Critical infrastructures Cyber Crime cyber threat cyber threats cyber weapon cyber weapons cyberwarfare Espionage Facebook Hackers Incident Large scale infiltration malware scareware socia media Social Network Socialbots stuxnet threats Trojan

you might also like

Pierluigi Paganini August 01, 2025
CISA released Thorium platform to support malware and forensic analysis
Read more
Pierluigi Paganini July 31, 2025
Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    ToolShell under siege: Check Point analyzes Chinese APT Storm-2603

    APT / August 01, 2025

    CISA released Thorium platform to support malware and forensic analysis

    Cyber Crime / August 01, 2025

    Russia-linked APT Secret Blizzard targets foreign embassies in Moscow with ApolloShadow malware

    APT / July 31, 2025

    Dahua Camera flaws allow remote hacking. Update firmware now

    Hacking / July 31, 2025

    Researchers released a decryptor for the FunkSec ransomware

    Malware / July 31, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT