Cyber Crime

Pierluigi Paganini May 30, 2015
Locker Ransomware Author Allegedly Releases Database Dump of Private Keys

Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts to the public. Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts worldwide to the public.  The “author” claims that […]

Pierluigi Paganini May 29, 2015
The recently Patched Flash flaw exploited by Angler EK to serve malware

The authors of the popular Angler exploit kit integrated an exploit for a Flash Player flaw fixed by Adobe just a couple of weeks ago. The creators of the popular Angler exploit KIT are known for being quick in integrating and exploiting zero-day vulnerabilities, this time they added an exploit related with the Flash player, […]

Pierluigi Paganini May 27, 2015
IRS breached, hackers access data of more 100,000 taxpayers

The Internal Revenue Service (IRS) was breached by hackers that “used an online service provided by the agency” to access data for more than 100,000 taxpayers. According to the Associated Press, the Internal Revenue Service (IRS) suffered a data breach, hackers “used an online service provided by the agency” to access data for more than 100,000 taxpayers. The […]

Pierluigi Paganini May 26, 2015
A student hired hackers to attack schools of the West Ada school district

An Eagle High School student may be charged with a felony after being accused of a cyber attack on the West Ada school district. I have decided to write about this story because it is the demonstration of the interference of cybercrime with the teenager’s life, a 17-year old high school student might be accused […]

Pierluigi Paganini May 26, 2015
NitlovePoS, The New PoS Malware is being spread by Spam

Researchers at FireEye have detected a new strain of point-of-sale (POS) malware being used in the wild and served through a spam campaign. A new malware called NitlovePoS has the capability of capture and exfiltrate track one and two from payment cards, and to accomplish that it scans the running processes of the infected machine. […]

Pierluigi Paganini May 26, 2015
Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing an interesting model of sale. In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A […]

Pierluigi Paganini May 25, 2015
Why Carbanak C&C points to Russia Federal Security Service?

A security researcher at Trend Micro discovered that the malware used by the Carbanak cybergang is using a C&C server linked to the Russian FSB. Maxim Goncharov, security expert at Trend Micro, revealed that one of the most sophisticated malware used by the popular gang Carbanak is now pointing to Russia’s Federal Security Service (FSB). The […]

Pierluigi Paganini May 25, 2015
Fake Android Minecraft apps scammed million users

Experts at ESET have discovered over 30 scareware uploaded to the Google Play store over nine months masquerading as Minecraft cheats and tip guides. Do you completely trust mobile applications available on the official app store like Google Play? If your answer is yes, you’re wrong. ESET security researcher Lukas Stefanko has discovered 30 malicious apps uploaded […]

Pierluigi Paganini May 25, 2015
Who and why is attacking companies in the Nordic Countries?

Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries. According to FireEye, threat actors targeted strategic industries (i.e. aerospace and defense, energy, health and pharmaceuticals, and shipping), government and defense agencies searching for political, economic and military intelligence. Experts believe sophisticated threat groups could be […]

Pierluigi Paganini May 24, 2015
Hi-tech car thieves use £30 jamming devices in car parks

Hi-tech car thieves use £30 jamming devices in car parks, the devices allow them to bypass car coding and reprogramme vehicles before driving off in them. Car thieves are becoming even more technological, we have read many news regarding hackers that designed specific solutions to hack car through the internal CAN bus or simply to unlock car doors […]