Cyber Crime

Pierluigi Paganini February 23, 2016
Ratopak Trojan – Russian banks under attack

Financially-motivated actors have targeted employees of at least six Russian banks into installing the Ratopak Trojan, experts have found evidence of an extended hacking campaign. According to the Symantec security firm, a cyber criminal gang financially -motivated has targeted employees of Russian banks. The threat actors have been using a Trojan called Ratopak to gain control over the […]

Pierluigi Paganini February 22, 2016
Admedia attacks now rely also on Joomla to serve ransomware

Operators running websites based on the WordPress and Joomla must be aware of a spike in the number of compromised platforms used in Admedia attacks. Not only WordPress CMS, threat actors behind the “Admedia attacks” are now looking with increasing interest to Joomla. This is the discovery made by the experts at the Internet Storm […]

Pierluigi Paganini February 22, 2016
FBI must reveal the network investigative technique used to hack more than 1000 computers

The FBI must provide details on the network investigative technique used to hack more than 1000 computers in a case involving child pornography. In a case involving child pornography, the FBI was ruled by a judge to provide all the code used to hack the PC of suspects and detailed information related to the procedure […]

Pierluigi Paganini February 22, 2016
Source code of the Android GM Bot malware was leaked online

The experts at the IBM X-Force threat intelligence have discovered that the source code for Android malware GM Bot was leaked online. Bad news for the Android community, the experts at IBM X-Force threat intelligence have discovered that the source code for Android malware GM Bot was leaked on an underground. The source code was […]

Pierluigi Paganini February 21, 2016
Linux Mint was hacked, website served malicious ISO on Saturday

The Linux Mint website had been hacked, on Saturday, intruders were able to compromise it and serve malicious ISO of Linux Mint 17.3 Cinnamon edition. The Linux Mint website had been hacked, on Saturday 20th, February, intruders were able to compromise the website serving malicious ISO of Linux Mint 17.3 Cinnamon edition. The disconcerting announcement was made […]

Pierluigi Paganini February 21, 2016
Project Cumulus – Tracking fake phished credentials leaked to Dark Web

Project Cumulus – A group of experts at Bitglass used watermarks to track data through the Dark Web and discover how far do phished credentials get. In April 2015, a group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. The experts discovered […]

Pierluigi Paganini February 20, 2016
Malicious spam campaign capitalizes the global interest in the Zika virus

The cybercrime ecosystem is getting ready to exploit the media attention on the Zika virus infections for illegal activities. Be careful! What is the relationship between the Zika virus and a malware? It’s just a matter of opportunity, the cyber crime ecosystem is getting ready to exploit the media attention on current issues for illegal […]

Pierluigi Paganini February 20, 2016
Locky Ransomware uses AES to encrypt Local Files and Unmapped Network Shares

Security researchers discovered a strain of ransomware called Locky that uses AES encryption to encrypt local files and files on network shares. Security researchers have discovered a new piece of ransomware called Locky, which uses AES encryption algorithm to encrypt both local files and files on network shares, even if they are unmapped. Security experts […]

Pierluigi Paganini February 19, 2016
Thousands of WordPress websites used as a platform to launch DDOS

In a recent investigation case, security researchers at Sucuri revealed that 26,000 different WordPress sites were exploited to launch Layer 7 distributed denial of service (DDoS) attacks. In a recent investigation case, security researchers at Sucuri revealed that 26,000 different WordPress sites were generating a sustained rate of 10,000 to 11,000 HTTPS requests per second […]

Pierluigi Paganini February 18, 2016
A sophisticated variant of OceanLotus trojan targets OS X systems

In May 2015, the Chinese security firm Qihoo 360 published a report on a Trojan called OceanLotus that was being used since 2012 for APT attacks in the Chinese market. The APT attacks based  on the OceanLotus focused on government organizations, research institutes, maritime agencies, and companies specializing in other activities. At the time were […]