Experts at Trustwave have discovered a spam campaign composed of several hundred messages trying to serve Dridex trojan though xml documents. Early 2015 security experts discovered a variant of banking malware dubbed Dridex that was spread through a phishing campaign using Microsoft Excel documents embedding malicious macro to infect victims’ machines. The Dridex malware implements features […]
British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack on the US Department of Defense in the 2014. British law enforcement has identified and arrested a 23-year-old man over a hacking attack on the US Department of Defense on June 15, 2014. The law […]
Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were exposed. A bad news for the US military, the Army and Air Force Exchange Service (AAFES) confirms that, following a the data breach of the German telecom company SIGA Telecom and an AAFES contractor occurred on March 5, […]
The annual study published by Javelin Strategy & Research on identity fraud estimates that U.S. consumers actually suffered fewer losses than in the past. Last year we observed a significant number of data breaches that cause the exposure of a huge quantity of information in the criminal ecosystem. According to the 2015 Identity Fraud Study (“2015 IDENTITY FRAUD: […]
Symantec revealed observed a significant drop in the number of  Financial Trojans in 2014, a report includes a detailed analysis of the phenomena. Symantec has analyzed the evolution of Financial Trojans in 2014 highlighting a significant drop in the number of detection of malicious agents. Symantec analyzed nine common financial Trojans during 2014, the sample analyzed targeted […]
Experts at Cisco discovered a new technique dubbed Domain Shadowing consisting in the creation of thousand subdomains used to spread the Angler exploit kit Cyber criminals have used hundreds of legitimate domain name accounts registered through GoDaddy to run a malicious campaign using the popular Angler exploit kit. Crooks hacked domain name accounts in order […]
Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card issuers. The security expert Cherian Abraham revealed a spike in the fraud on Apple’s mobile payment platform, Apple Pay. The criminals are trying new techniques to compromise the Apple security chain. While the Apple devices and software are […]
The emails of a new TorrentLocker campaign use Domain-based Message Authentication, Reporting and Conformance (DMARC) to avoid detection and collect data. Cyber criminals are continuously improving the technique to spread malicious code and avoid detection systems. Recently security experts at Trend Micro noticed an improvement in the evasion techniques implemented by malware authors to spread the […]
The giant Uber announced a data breach that resulted in unauthorized access to the driver partner license numbers of roughly 50,000 of its drivers. Are you a user of the Uber service? There is a bad news for you! Uber also enters the long list of companies who are victims of a data breach. On Friday, […]
Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms. Cyber criminal organizations appear more interested in target trading algorithms, patents, trade secrets than other kinds of information, this is the new trend observed by security experts. Cyber criminals are increasing their activity against private […]