Cyber Crime

Pierluigi Paganini September 07, 2014
EPPB tool copies usable to download victims’ data from iCloud backups

Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak of celebrity photos. Recently naked pictures of celebrities have been leaked online, but security experts were particularly interested to the news because they speculate that the images have been stolen from the Apple iCloud service. […]

Pierluigi Paganini September 06, 2014
APT ported XSLCmd Backdoor on OS X according to FireEye

Security Experts at FireEye Lab discovered a new variant of the XSLCmd backdoor that has been used in targeted attacks infecting Mac OX based systems. Experts at FireEye Labs have discovered a previously unknown variant of the APT backdoor XSLCmd, OSX.XSLCmd, which is used by a group of hackers known for past cyber espionage activities against the U.S. […]

Pierluigi Paganini September 06, 2014
Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground. Chinese cybercrime underground activity is rapidly increasing, according to a new interesting report published by Trend Micro the Chinese it is doubled between 2012 and 2013. The findings confirm that amount of underground activity in China doubled both with […]

Pierluigi Paganini September 05, 2014
The rapid growth of the Darknet black markets

The Digital Citizen’s Alliance provided an updating to the study which analyzes online black markets, focusing on the sales of illegal drugs. The cybercrime ecosystem has no limit, it is a prolific industry that evolves with time and is always full of new players as reported in a recent report published by the Digital Citizen’s Alliance. The […]

Pierluigi Paganini September 05, 2014
IptabLes and IptabLex botnet targeting Linux servers to run large-scale DDoS attacks

Experts at Akamai-Prolexic discovered a botnet dubbed IptabLes and IptabLex that infects and exploits poorly-maintained Linux servers to run DDoS attacks. Akamai’s Prolexic division has uncovered a new botnet dubbed IptabLes and IptabLex, which was used in a series of attacks targeting malware based on Linux servers. The experts revealed that the IptabLes and IptabLex botnet compromises misconfigured and […]

Pierluigi Paganini September 04, 2014
AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several industries. Security experts at AlienVault Labs have uncovered a watering hole attack with a singular characteristic, the attackers are using a framework developed for reconnaissance as the primary infection vector. The attackers deployed a malicious JavaScript on the targeted […]

Pierluigi Paganini September 04, 2014
Analyze VirusTotal Metadata to profile hackers

An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad actors. VirusTotal is the Google owned company which offers free checking of URLs and files for viruses and other malicious code, its systems use up to 54 different antivirus software to scan files and URLs provided by the userscheck. Cyber criminals […]

Pierluigi Paganini September 03, 2014
Brazilian cyber criminals targeting home routers

Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers by using a web-based attack. Experts at Kaspersky Lab have uncovered a hacking campaign conducted by Brazilian threat actors which is targeting home routers by using a web-based attack. The hackers are adopting different techniques, […]

Pierluigi Paganini September 03, 2014
Hacking traffic light systems

In this article published on the Infosec Institute are analyzed the principal studies on the security of traffic light systems and techniques to hack them. http://resources.infosecinstitute.com/hacking-traffic-light-systems/ We often see movie scenes in which hackers are able to hack systems for the control of traffic lights, with catastrophic consequences, unfortunately we must be conscious that threat […]

Pierluigi Paganini September 03, 2014
Namecheap accounts compromised using the CyberVor’s archive

Hosting provider Namecheap warned its customers that hackers compromised some of its users’ accounts using the CyberVor’s archive of credentials. Hosting provider Namecheap announced that earlier this week that hackers compromised some of its users’ accounts, apparently using the “CyberVor” collection of 1.2 billion usernames and passwords compiled by Russian hackers.  “CyberVor” (“vor” means “thief” in Russian) […]