Cyber Crime

Pierluigi Paganini July 21, 2016
Major websites compromised in the last SoakSoak campaign

A large number of business websites have been compromised by the SoakSoak gang to deliver ransomware. Security experts from Invincea firm have discovered that a large number of websites were recruited by the SoakSoak botnet to deliver CryptXXX malware. The list of compromised sites is long and includes the tourism website for Guatemala and the do-it-yourself project […]

Pierluigi Paganini July 20, 2016
Delilah, the first Trojan to recruit Insiders

Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed to extort victims into stealing insider data, it was first discovered on crime forums by the Israeli intelligence firm Diskin Advanced Technologies. Deliah is not distributed in […]

Pierluigi Paganini July 19, 2016
cuteRansomware leverages Google Docs to avoid detection

A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features. A recently discovered strain of ransomware, dubbed cuteRansomware, shows that your enterprise isn’t the only one thinking about cloud transition. Modern day hackers are loving the Cloud too. The cuteRansomware was discovered by Netskope security firm which observes an increase […]

Pierluigi Paganini July 19, 2016
Abusing Two-factor authentication to steal money from Instagram, Google and Microsoft

A security expert revealed a number of flaws in the big player’s two-factor authentication methods that could allow crooks to steal money. Social media bug bounty hunter, Arne Swinnen, has revealed a number of flaws in the big player’s 2 factor authentication (2FA) methods that could enable a malicious user to illicit large sums of […]

Pierluigi Paganini July 19, 2016
SFG malware was not designed to target SCADA systems in the energy industry

Security experts from Damballa that analyzed the SFG malware confirmed that it was not designed to target SCADA systems in the energy industry Recently, experts from the SentinelOne security firm spotted a sophisticated malware dubbedSFG, a spawn of Furtim malicious code, targeting at least one European energy company. Media speculated the existence of a powerful SFG […]

Pierluigi Paganini July 19, 2016
Hacker is offering for sale a complete US Voters archive

Colleagues at HackRead discovered a seller using the pseudonym of ‘DataDirect’ offering US voters’ registration records on a black marketplace. On the Dark Web is quite easy to find any kind of data, recent data breaches have literally flooded the principal black markets. Recently, colleagues at HackRead discovered a seller using the pseudonym of ‘DataDirect’ […]

Pierluigi Paganini July 18, 2016
Data breaches in the healthcare sector are fueling the dark web

Data breaches in the healthcare sector are fueling the dark web, millions of people’s medical records are offered for sale in the dark side of the internet. In the past several years, security pundits have been predicting that the healthcare sector was going to be the hotbed of cyber threat activity.  These predictions go back […]

Pierluigi Paganini July 17, 2016
Hackers used malware to steal $2 million from ATMs in Taiwan

Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million theft. Law enforcement in Taiwan investigating the attacks against ATMs of a major nations bank, the Taiwan’s First Bank. Crooks used a malware to withdraw more than $2 million from dozens of ATMs in the country, it […]

Pierluigi Paganini July 16, 2016
Eleanor Mac malware connects your webcam to the dark web

The malware dubbed Backdoor.MAC.Eleanor is embedded surreptitiously in the fake app EasyDoc Coverter.app and allows to control your webcam from the dark web Following the first ever instance of mac ransomware, recently reported by Palo Alto Networks. A second piece of malware has been discovered in the wild. The malicious software dubbed Backdoor.MAC.Eleanor or OSX/Eleanor-A comes […]

Pierluigi Paganini July 15, 2016
Experts published IE Exploit code and crooks added it to Neutrino EK

Operators behind the Neutrino EK have added the code to exploit an Internet Explorer flaw that  was recently patched with the release of the MS16-053. Operators behind the infamous Neutrino EK have recently added the code to exploit an Internet Explorer vulnerability that was patched with the release of the MS16-053 security bulletin. The MS16-053 bulletin patched […]