Cyber Crime

Pierluigi Paganini April 07, 2015
Data Breach – Hackers violated a server at Linux Australia

The organization Linux Australia revealed that one of its servers was hacked. The personal data of conference attendees might have been exposed. Linux Australia revealed a data breach occurred on March 22, according to the organization attackers may have accessed personal details of conference attendees. Linux Australia is an organization that represents nearly 5,000 Australian users […]

Pierluigi Paganini April 06, 2015
Home Office – Cybercrime goes unpunished in the UK

British law enforcement is in difficulty facing the cybercrime, just one computer hacker a month convicted of cyber crime out of 100,000 incidents a year. Cybercrime is becoming very attractive for ordinary crime, high earnings, limited risks than other criminal activities and poor perception of crime are among the elements that are facilitating the rapid spread of […]

Pierluigi Paganini April 06, 2015
Another phishing scam is targeting Yahoo users

A new phishing scam is targeting Yahoo users worldwide, this campaign could be ineffective if we share awareness about bad actors’ TTPs. A new large-scale scam is trying to deceive Yahoo users that are receiving a phishing email that asks for “Yahoo Account Confirmation.” The phishing email claims to be sent by Yahoo, it requests […]

Pierluigi Paganini April 04, 2015
Abusing block chain to share illegal data, including pedo material

The international criminal police organisation Interpol and private researchers discovered a severe flaw in block chain used by virtual currencies. INTERPOL cyber threat researchers, including members of the Kaspersky Lab, have identified a serious vulnerability in the virtual currencies schema. The flaw resides in the ‘block chain’ related to virtual transactions and it could be exploited to […]

Pierluigi Paganini April 03, 2015
Eastern European Cyber-gang manages a new Dyre Wolf campaign

Security experts from IBM discovered a very sophisticated malware campaign based on the Dyre Trojan to hack Corporate Bank Accounts. IBM has uncovered an important cyber criminal operation dubbed The Dyre Wolf due to the name of the popular Dyre malware used crooks. The Dyre malware was discovered in the wild by several security firms, […]

Pierluigi Paganini April 03, 2015
TrendMicro spotted a 64-Bit variant of NewPosThings PoS malware

Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]

Pierluigi Paganini April 02, 2015
Fake Pirate Bay website exploited to serve banking Trojan to WordPress users

Security experts at MalwareBytes discovered that unaware WordPress users are infected with a banking trojan served by a fake Pirate Bay website. Some WordPress websites are being used to redirect users to a fake Pirate Bay that is being used to make the reader to push malware, says Malwarebytes. WordPress websites were injected with the same iframe during the […]

Pierluigi Paganini April 01, 2015
Energy companies infected by newly Laziok trojan malware

Symantec has discovered a cyber espionage campaign targeting energy companies around the world by infecting them with a new malware dubbed Laziok trojan. Security experts at Symantec have uncovered a new cyber espionage campaign that targeted the energy industry. The threat actors behind the campaign used uses a custom-developed malware dubbed Laziok trojan to exfiltrate sensitive data from […]

Pierluigi Paganini April 01, 2015
PRESIDENT OF ECIPS, MR BARETZKY SPEAKS AT 2015

President of ECIPS warns of cyber terror problems ahead at C I P R congress.  Terrorism is evolving with cyber warfare capability. Critical Infrastructure Protection & Resilience meetings were attended by almost every agency in EU and US defense department. The Critical Border Cyber Defense Infrastructure of the EU Critical Infrastructure Protection & Resilience     […]

Pierluigi Paganini April 01, 2015
Volatile Cedar, the cyber espionage campaign from Lebanon

Volatile Cedar APT group is a new hacking team, apparently from Lebanon, that compromised systems worldwide, most of those in Israel Security experts from Check Point Software Technologies have uncovered a new cyber espionage campaign, dubbed Volatile Cedar, that targeted hundreds of entities from at least ten countries (Lebanon, Israel, Turkey, the UK, Japan, the US, etc.). The […]