Cyber Crime

Pierluigi Paganini May 26, 2015
Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing an interesting model of sale. In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A […]

Pierluigi Paganini May 25, 2015
Why Carbanak C&C points to Russia Federal Security Service?

A security researcher at Trend Micro discovered that the malware used by the Carbanak cybergang is using a C&C server linked to the Russian FSB. Maxim Goncharov, security expert at Trend Micro, revealed that one of the most sophisticated malware used by the popular gang Carbanak is now pointing to Russia’s Federal Security Service (FSB). The […]

Pierluigi Paganini May 25, 2015
Fake Android Minecraft apps scammed million users

Experts at ESET have discovered over 30 scareware uploaded to the Google Play store over nine months masquerading as Minecraft cheats and tip guides. Do you completely trust mobile applications available on the official app store like Google Play? If your answer is yes, you’re wrong. ESET security researcher Lukas Stefanko has discovered 30 malicious apps uploaded […]

Pierluigi Paganini May 25, 2015
Who and why is attacking companies in the Nordic Countries?

Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries. According to FireEye, threat actors targeted strategic industries (i.e. aerospace and defense, energy, health and pharmaceuticals, and shipping), government and defense agencies searching for political, economic and military intelligence. Experts believe sophisticated threat groups could be […]

Pierluigi Paganini May 24, 2015
Hi-tech car thieves use £30 jamming devices in car parks

Hi-tech car thieves use £30 jamming devices in car parks, the devices allow them to bypass car coding and reprogramme vehicles before driving off in them. Car thieves are becoming even more technological, we have read many news regarding hackers that designed specific solutions to hack car through the internal CAN bus or simply to unlock car doors […]

Pierluigi Paganini May 24, 2015
Security Affairs newsletter Round 10 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Chinese hackers hit Penn State University, 18K people impacted ISIS – Cyber Caliphate hackers are threatening Electronic War Use privacy software if you want to be safe from Facebook, […]

Pierluigi Paganini May 24, 2015
The Phantom Menace, who targeted the oil tankers?

Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. According to Panda Security the attacks on oil cargos began in August […]

Pierluigi Paganini May 23, 2015
Adult FriendFinder dating site hack exposes million users

Cyber criminals have hacked the popular online dating websites Adult FriendFinder leaking the highly sensitive sexual information on a forum in the dark web. The popular dating website Adult FriendFinder was hacked, it suffered a massive data breach that potentially exposed personal details of nearly 4 Million users. According to Channel 4 News, the information was offered […]

Pierluigi Paganini May 22, 2015
Thieves are using commercial drones for burglaries

Law enforcement warns thieves are using the mini-helicopters and commercial drones to carry out reconnaissance on homes to burgle. Security and privacy issued related to the use of drones must be carefully addressed in order to avoid dangerous effects due to their diffusion, there are several ways to abuse of such complex and powerful machines […]

Pierluigi Paganini May 22, 2015
Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware infections. CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are […]