The security Expert Michael Fratello provide us a closer look at the Dridex Trojan following its investigation on the malicious agent. The Dridex Banking Trojan is a part of a family of Trojans classified as “banking trojans“. An article describing the Dridex Trojan and some of its inner-workings were published by TrendMicro in November of 2014. […]
A TV5Monde staffer accidentally revealed a password used to access the social media account of the broadcaster in an interview. Following the successful attack against the network of the TV French Channel TV5Monde, law enforcement and French Intelligence started to investigate the attach chain. Investigators speculate that one of the possible way hackers obtained credentials for systems […]
ESET has discovered a new hacking campaign dubbed Operation Buhtrap based on a family of spyware targeting vulnerabilities within the Russian Windows System. Late in 2014 analysts at ESET uncovered CVE-2012-0158, a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library. This particular malicious code can be activated by a […]
The Beebone botnet has been shut down in a joint operation between U.S. and European law enforcement and a number of private security companies. A new joint operation run by US and European law enforcement and a number of private security firms took down the polymorphic Beebone botnet, also known as AAEH. The operation was […]
Members of the ISIS Cyber Caliphate hacking crew attacked French TV network TV5Monde on Wednesday evening disrupting the broadcast of its TV channels. The French TV Channel TV5Monde was targeted by a serious cyber attack on Wednesday that compromised broadcasting of transmissions across its medium.the attackers also hijacked the Channel TV5Monde website and social media […]
The FBI is warning that individuals sympathetic to the ISIS are running mass-hacking websites exploiting known vulnerabilities in WordPress. The FBI is warning administrators of WordPress websites about the possibility of cyber attacks carried out by sympathizers of the ISIS terrorist group. Unfortunately, it is quite simple to compromise websites based on the popular content management system (CMS) that […]
Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]
According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]
According to officials at the Federal Aviation Administration (FAA), hackers earlier this year targeted the Agency network with a malware. It’s official, the network of the Federal Aviation Administration (FAA) was targeted early 2015 by unknown hackers. According to FAA officials, the threat actors used a malware to compromise the infrastructure of the agency. “In early February, the FAA […]
Anonymous hit numerous Israeli websites as promised in a video message posted a few days ago, which was threatening Israel with “the electronic holocaust.” As promised hackers belonging to the Anonymous collective have hit Israeli websites. Last week Anonymous hacktivists published a video online threatening Israel with “the electronic holocaust.” The voice in the video […]