Cyber Crime

Pierluigi Paganini March 01, 2016
New HackingTeam OS X RCS spyware in the wild, who is behind the threat?

A new OS X sample of the Hacking Team RCS has been detected in the wild, who is managing it? Is the HackingTeam back? A group of malware researchers has discovered a new strain of Mac malware undetected my most security firm, but more  intriguing is the speculation that the malicious code may have been […]

Pierluigi Paganini February 29, 2016
The new FighterPOS PoS Malware implements worm capabilities

The threat actors behind the FighterPOS PoS malware have added worm capabilities to their malicious code that is now targeting systems in the United States. PoS malware represents a serious threat to several industries, from retail to the hotel industry. During the last twelve months, security experts have discovered a significant number of payment card frauds involving […]

Pierluigi Paganini February 28, 2016
A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]

Pierluigi Paganini February 28, 2016
CTB-Locker for Websites is spreading in the wild

The experts at BleepingComputer reported a new strain of CTB-Locker for Websites, a new ransomware that mainly targets WordPress sites. Ransomware continues to threaten users worldwide, today we discussed German Hospitals paralyzed by the malware.  TeslaCrypt, Cryptowall and Locky are the names of the most popular ransomware that already infected millions machines worldwide. The experts at BleepingComputer reported a new […]

Pierluigi Paganini February 27, 2016
Gemalto Breach Level Index report 2015, what are hackers looking for?

2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per the security firm Gemalto, Government and healthcare have overwhelmed the retail area as most-focused for information breaks. An aggregate of 1,673 information ruptures prompted 707 million information records being traded off worldwide amid 2015, as […]

Pierluigi Paganini February 27, 2016
Ransomware attacks paralyzed at least two German hospitals

New ransomware infections hit Germany hospitals, at least two structures were infected by the dreaded malware. New ransomware infections hit hospitals in Germany, at least two of them were infected by the dreaded malware. According to local reports, the systems at two German hospitals were infected by a ransomware, in a similar way occurred recently at the US Hollywood […]

Pierluigi Paganini February 26, 2016
The DoD funded the Carnegie Mellon University’s research on Tor Hacking

A judge has confirmed that US Departement of Defense funded the Carnegie Mellon University to conduct research on the Tor hacking. In November 2015, the researchers at the Tor Project publicly accused the FBI of paying the experts at the Carnegie Mellon University to deanonymize Tor users. The experts at the Tor Project collected information about the […]

Pierluigi Paganini February 25, 2016
Author of the Angler EK integrated recently Silverlight exploit

The security researcher Kafeine confirmed that the authors of the Angler EK have integrated the exploit for a recently patched Microsoft Silverlight vulnerability. Ransomware is becoming one of the most dreaded cyber threats for netizens, security experts noticed a surge in the number of cyber attacks aimed to spread malware like Cryptowall and TeslaCrypt. Exploit kits like the Nuclear EK […]

Pierluigi Paganini February 25, 2016
Operation Blockbuster revealed the Lazarus Group Activities

The Operation BlockBuster Coalition has disclosed the results of its investigation on the activities of the Lazarus Group that is believed to be behind the Sony Pictures hack. State-sponsored hackers allegedly behind the Sony Pictures hack have been linked to other security breach suffered by a number of companies in South Korea. The FBI blamed the North Korea, the […]

Pierluigi Paganini February 24, 2016
Operation Dust Storm, hackers Target Japanese Critical Infrastructure

Japanese commercial and critical infrastructure organizations have been targeted a long-running campaign dubbed Operation Dust Storm. Security firm Cylance have uncovered a long-running hacking campaign dubbed ‘Operation Dust Storm’ targeting commercial and critical infrastructure organizations in Japan. Threat actors behind the Operation Dust Storm have been active since at least 2010, the hackers targeted several organizations in Japan, […]