The Turkish security researcher Utku Sen was blackmailed by hackers behind the Magic ransomware to close his projects. The developers behind the open source-based âMagicâ ransomware are blackmailing the creator of Hidden Tear and EDA2 in order to force the developer to abandon the projects. Recently I have written about the RANSOM_CRYPTEAR.B ransomware developed Utku Sen starting from a proof-of-concept […]
According to Palo Alto Networksâ Unit 42 the Chinese APT group Codoso has been targeting organizations in various industries in a new wave of cyber attacks. The group of experts at Palo Alto Networks Unit 42 have uncovered a new cyber espionage operation conducted by the Chinese AT Codoso (aka C0d0so0 or Sunshop Group). The Codoso hacking crew has been […]
The victims of the infamous TeslaCrypt ransomware can now rejoice, there is a free tool to decrypt files encrypted by TeslaCrypt and TeslaCrypt 2.0 TeslaCrypt is one of the most insidious ransomware first detected in the wild in 2015, today I have a good news for its victims. TeslaCrypt was first detected in February 2015, the […]
The latest variant of CryptoWall 4.0, one of the most popular and dangerous ransomware threats, has been recently added to the infamous Angler Exploit Kit. In my 2016 Cyber Security Predictions, I have predicted the criminal practices of the extortion will reach levels never seen before. Cyber criminals will threaten victims with ransomware and DDoS attack in […]
Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]
The Austrian engineering firm FACC which designs Airbus, Boeing aero parts was victim of a significant cyber attack. I always remark the importance of cyber security in a business context, a proper cyber security posture is important like the finances of a company. A cyber security incident could have serious effects on the business continuity […]
In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops others accuse Feds of dragnet surveillance. In 2013 the FBI agents seized TorMail, at the time the most popular dark web email services. The US law enforcement agency seized the TorMail database during in concomitants of the […]
Facebook users are receiving malicious email delivering malware masquerading as audio message, a similar campaign also targeted WhatsApp users. Social media and instant messaging application are a privileged vector for cyber threats, in many cases bad actors exploited them to spread malicious links and infect a large number of users. Now a new campaign is targeting […]
Security experts at IBM X-Force team discovered a new hacking campaign based on the infamous Dridex trojan. Security experts at IBM X-Force team discovered a new wave of attacks based on the Dridex malware targeting British businesses. The malware has targeted rich UK bank accounts in a new campaign that is operated by threat actors well-resourced, a criminal […]
Asacub is a new Android threat that has been used by bad actors to infect thousands of users in Russia in a recent SMS spam campaign. According to the experts from Kaspersky Lab, the Trojan-Banker.AndroidOS.Asacub was first detected as a new spyware Trojan. The experts noticed that one of the C&C servers used by the Asacub Android malware (chugumshimusona[.]com) was also […]