Cyber Crime

Pierluigi Paganini February 22, 2015
Rule 41 – Google against the expansion of FBI hacking powers

The Us Justice Department’s proposal to grant FBI Rule 41 specific hacking rights is under high scrutiny. While the amendment is being reviewed, the Advisory Committee on Criminal Rules will consider public objections, including a letter from Google. The amendment to the Federal Rule of Criminal Procedure 41 (Rule 41) would expand jurisdiction for judges to […]

Pierluigi Paganini February 21, 2015
Verisign report – The rise of DDoS attacks as a service

A new report published by Verisign provides useful data related to the recent evolution of DDoS attacks and the services that offer them. DDoS attacks are even more dangerous for every organization that exposes its resources and services on the Internet, recent attacks against Sony PSN network and XBox live service demonstrate it. DDoS attacks despite […]

Pierluigi Paganini February 21, 2015
Onion.City the new search engine for the Deep Web simply use a common browser

Onion.City the new search engine specialized for the black markets in the Deep Web simply accessible from a common browser. We have described several times the not indexed portion of the web known as the Deep Web, an impressive amount of content that the majority of netzens totally ignore. Deep Web is also known for the anonymity […]

Pierluigi Paganini February 20, 2015
“TNT” gang has released a new hardware TDoS tool in the criminal underground

Telephone DDoS attacks are on the rise, the  criminal group known as “TNT” gang has released a new hardware tool in the underground ecosystem. The IntelCrawler cyber threat intelligence company has discovered a new advanced tool, dubbed ‘TNT Instant Up’, for Telephone Denial of Service attacks (TDoS). TDoS is a common practice in the criminal underground, it consists in flooding […]

Pierluigi Paganini February 19, 2015
Arid Viper – Israel entities targeted by malware packaged with sex video

Attackers behind the Arid Viper and the Yanbian Gang exploited sex  content for their campaigns against victims in Israel and Kuwait, and South Korea. Security experts at Trend Micro have uncovered a cyber espionage campaign, dubbed Operation Arid Viper, that targeted Israeli institutions. The Operation Arid Viper is run by Arab-speaking hackers that sought to extract […]

Pierluigi Paganini February 18, 2015
Yanbian Gang steals millions from mobile banking customers of South Korea

A Chinese hacking crew dubbed Yanbian Gang has siphoned data from mobile banking customers in South Korea during the past two years, according to a new report. According to researchers at Trend Micro, the cybercriminals used fake banking apps having the same appearance (i.e. icons and user interface) of the legitimate mobile apps, to trick users. […]

Pierluigi Paganini February 17, 2015
Ali Baba, the APT group from the Middle East

Adrian Nish of BAE System presented the results of its investigation on the Ali Baba APT group operating from the Middle East that hit Western companies. Yesterday the Kaspersky Lab team revealed the results of its investigation on the hacking crew dubbed the Equation group, a team of hackers that demonstrate extraordinary capabilities and sophisticated tactics, […]

Pierluigi Paganini February 17, 2015
How attackers use phishing kits for their campaigns

How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of attacks? Most of the major banks and companies that suffer this type of attacks make people aware of phishing, but despite the high level of awareness of the threat, the phenomenon does not slow down, indeed seems to accelerate […]

Pierluigi Paganini February 17, 2015
The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with  sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]

Pierluigi Paganini February 17, 2015
PoS malware infected payment systems at the Jefferson National Parks Association

Jefferson National Parks Association discloses POS breach at Gateway Arch stores caused by a malware infection of the payments systems. Jefferson National Parks Association announced on Friday about malware found on Point-of-Sale (POS) Systems deployed by two gift shops named Gateway Arch located in St. Louis. So far, it has been confirmed that most of […]