Cyber Crime

Pierluigi Paganini September 13, 2016
324,000 Financial Records leaked online, who is the victim?

A hacker leaked a data dump containing more than 320,000 Financial Records apparently stolen from an Israeli payment processor. Another data breach is in the headline, roughly 324,000 financial records have been leaked online. The financial data appears to have been stolen either from payment processor BlueSnap or its customer Regpack, a hacker published a link to the archive (a file Titled […]

Pierluigi Paganini September 13, 2016
2 Israeli teens arrested for allegedly running the vDoS booter

The Israeli law enforcement arrested two youngsters suspected of operating the infamous vDoS booter. Israeli authorities have arrested two alleged operators of a DDoS service, named vDOS, as the result of an investigation conducted by the FBI. The popular security investigator Brian Krebs reported that the duo behind the vDOS booter service had earned more than $600,000 […]

Pierluigi Paganini September 13, 2016
GovRAT 2.0 continues to target US companies and Government

Vxers developed a new version of GovRAT, called GovRAT, that has been used to target government and many other organizations in the US. GovRAT is an old cyberespionage tool, it has been in the wild since 2014 and it was used by various threat actors across the years. Security experts from the threat intelligence company […]

Pierluigi Paganini September 12, 2016
Hacking wannabe hackers: watch out Facebook Hacker Tools!

Everyone is a potential victim, even the wannabe hackers that try to exploit Facebook Hacker Tools to hack into friends’ accounts. When dealing with cybercrime everyone, is a potential victim, even the hackers, this is the case of a Crimeware-as-a-Service hack that turns wannabe crooks into victims. For those who are looking to hack the Facebook accounts […]

Pierluigi Paganini September 12, 2016
Mal/Miner-C mining malware leverages NAS devices to spread itself

Experts from Sophos discovered Mal/Miner-C, a malware designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. Malware researchers from security firm Sophos have analyzed a new strain of malware detected as Mal/Miner-C that was designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. The experts discovered that the new […]

Pierluigi Paganini September 11, 2016
LuaBot is the first Linux DDoS botnet written in Lua Language

The researcher MalwareMustDie discovered LuaBot, a trojan completely coded in Lua language that is targeting Linux platforms to recruit them in DDoS botnet. Let’s continue our tour in Linux security, focusing on malicious code specifically designed to target such systems. The popular security researcher MalwareMustDie, who recently reported the new ELF trojan backdoorLinux/Mirai, also discovered a […]

Pierluigi Paganini September 09, 2016
Over 33 Million QIP.ru accounts hacked compromised in an old data breach

Another old and huge data breach was reported to LeakedSource, more than 33 million QIP records from 2011 have been compromised. Once again we are here to discuss a data breach, the victim is the Russian instant messaging service Quiet Internet Pager (QIP.ru.). According to the breach notification service LeakedSource, the leaked dump includes details of […]

Pierluigi Paganini September 09, 2016
Two alleged members of Crackas With Attitude group arrested for hacking US Gov Officials

U.S. authorities have arrested two alleged members of the Crackas With Attitude group involved in dumping details of officials with the FBI and the DHS. The FBI has identified and arrested two men from North Carolina men that are suspected to be members of the notorious ‘Crackas With Attitude‘ hacker group that dumped details of government […]

Pierluigi Paganini September 08, 2016
Cross-platform Mokes backdoor OS X exists and is spreading in the wild

Malware researchers from Kaspersky Lab confirmed the existence of an OS X variant of the Mokes backdoor discovered in January by Kaspersky. Malware researchers from Kaspersky Lab confirmed the existence of an OS X variant of a recently discovered family of cross-platform backdoors. The backdoors family was named Mokes and a strain of malware was […]

Pierluigi Paganini September 07, 2016
CSTO Ransomware, a malware that uses UDP and Google Maps

CSTO ransomware it is able to query the Google Maps API to discover the victim’s location and connects to the C&C via UDP. Ransomware is considered by the security experts one of the most dangerous threats to Internet users and organizations across the world. Malware authors are developing new malicious codes that implement new features […]