Cyber Crime

Pierluigi Paganini November 18, 2015
JPMorgan hackers also hacked an anti-fraud corporation

According to the Federal indictment about the JPMorgan case, the cyber gang also hacked an anti-fraud corporation labeled as “Victim #12” to remain hidden. According to the Federal indictment about the JPMorgan case of 83 million stolen customer records, there is a firm labeled as “Victim #12,” that had been hacked to enable hackers to […]

Pierluigi Paganini November 17, 2015
Stop DDoS attacks in seconds

An Israeli company named “L7 Defense” is trying to do the impossible – to stop application layer DDoS attacks in seconds instead of hours. It wants to do so by using an automatic protection system based on an immune-biological model that combines with Real Time Big Data analysis. “The body knows how to deal in […]

Pierluigi Paganini November 16, 2015
Twittor tool uses Twitter direct messages to control botnets

Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. Twittor is a tool open source that was designed by the London-based researchers Paul Amar to control botnets via Direct Messages. The expert has developed the Twittor tool to make life easier for botnet masters, allowing them to control their […]

Pierluigi Paganini November 14, 2015
You can buy a Cryptolocker/Cryptowall Ransomware Kit for $3,000

Experts at BitDefender have discovered a Cryptolocker/Cryptowall Ransomware Kit offered for sale at $3,000, source code included. Yesterday I wrote about a new Ransomware-as-a-service, the FAKBEN, surfaced from the criminal underground, requesting customers 10 percent profit cut. In the previous days I reported other cases involving ransomware, such as a malicious code that infected the UK […]

Pierluigi Paganini November 13, 2015
FAKBEN Ransomware-as-a-service emerges from the underground

FAKBEN is offering a professional Ransomware-as-a-service that relies on a new CryptoLocker ransomware which can be downloaded through the executable file. Ransomware is probably the most popular category of malicious code in this period, this week we have discussed a malicious code that infected the UK Parliament, an off-line ransomware and a Linux.Encoder1 ransomware revealing the decryption key. News of the […]

Pierluigi Paganini November 13, 2015
Central Shop, the evolution of credit card black markets

Central Shop is a web portal dedicated to the sale of stolen credit card data that captures the attention of the experts due to its amazing interface. The sale of stolen credit card data is one of the most prolific activities in the criminal ecosystem, in many black markets it is quite easy to acquire the precious commodities. Today […]

Pierluigi Paganini November 12, 2015
Android Tablets with Pre-loaded Cloudsota malware sold on Amazon

Experts at Cheetah Mobile are warning about Android Tablet pre-loaded with Cloudsota Trojan sold on Amazon and other online stores. Once again electronics equipment from China was offered for sale with pre-installed Trojan. This time, several models of Android tablets sold on Amazon and other online stores are sold with pre-loaded the Cloudsota malware. Cheetah Mobile has […]

Pierluigi Paganini November 11, 2015
Ransomware infected the UK Parliament’s computer networks

A ransomware infected several PC at the UK Parliament, for the first time a threat hit the internal computer network, the Parliamentary Digital Service. Ransomware is once again in the headlines, this time the attention of the media was caught due to the nature of the victim, the UK Parliament. Cyber criminals have infected the computers […]

Pierluigi Paganini November 11, 2015
88 percent of company networks vulnerable to privileged account hacks

A research published by CyberArk Labs focuses on targeted attacks against organizational networks, analyzing hackers’ methods, tools and techniques. Bad news for network administrators, according to the security company CyberArk, 88 percent of networks are susceptible to privileged account hacks. The report published by CyberArk entitled “Analyzing Real-World Exposure to Windows Credential Theft Attacks” reveals that corporate […]

Pierluigi Paganini November 11, 2015
What You Should Know about Triangulation Fraud and eBay

The increasing phenomenon of triangulation fraud on eBay has led to a published analysis on behalf of the company, as to how buyers should get informed and what they should pay attention to. Over the past few months, a new phenomenon has risen and its proportions have been growing exponentially. It seems that, even if […]