Cyber Crime

Pierluigi Paganini February 15, 2015
Carbanak cybergang swipes over $300 million from banks

Kaspersky discovered that a multinational gang of hackers dubbed Carbanak cybergang has stolen at least $300 million from 100 financial institutions. A group of cybercriminals used a malware to steal at least $300 million from banks and other financial institutions worldwide, according to a report published Saturday by The New York Times. The hackers have named […]

Pierluigi Paganini February 15, 2015
Anthem Breach: a Slow and Silent Attack

Experts at Check Point security firm analyzed the recent data breach suffered by Anthem, the nation’s second-largest health insurer. The attack on Anthem, the second-largest health insurer in the U.S., which exposed identifiable personal data of tens of millions of people, was probably not a smash-and-grab raid but instead a sustained, low-key siphoning information over […]

Pierluigi Paganini February 14, 2015
Crooks steal money from Standard Chartered Accounts by hacking ATMs

A Group of hackers has stolen money from Standard Chartered Bank Accounts by hacking the ATMs of the organization in Pakistan. Recently Pakistan customers of the Standard Chartered Bank have received transaction alerts via email and SMS that alerted them about alleged withdrawals of Rs.50, 000 ($500) cash from their bank accounts. The problem is […]

Pierluigi Paganini February 12, 2015
The value of personal data in the criminal underground

Which is the cost of personal data in the criminal underground? How cyber criminals steal personal data? Which is the cashout process? What is the underground economy? Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime. It’s within these […]

Pierluigi Paganini February 12, 2015
Chinese hackers hit Forbes visitors with zero-day exploits

Security experts at Invincea and iSIGHT Partners uncovered a hacking campaign that used two distinct zero-day flaws to compromise Forbes.com website. Security experts at Invincea and iSIGHT Partners in a joint investigation tried to profile a Chinese APT group that used two distinct zero-day flaws to compromise Forbes.com website. The intent of the group was to […]

Pierluigi Paganini February 12, 2015
Exploiting DNS Poisoning in Brazilian Boleto Fraud Scheme

In recent months Brazilian criminal crews have started using DNS poisoning technique to target Brazilian Boletos. Security experts at RSA reported that DNS poisoning attacks are being used by cybercriminals to target Brazilian Boletos. What is Boleto? People in Brazil use popular payment method known as “Boleto” to purchase services and products by using vouchers instead […]

Pierluigi Paganini February 11, 2015
Dutch Government websites suffered a major cyber attack

The Netherlands’ ANP news agency revealed that the outage of Dutch Government websites, lasted for most of Tuesday, was caused by a major cyber attack. According to the Netherlands’ ANP news agency, the outage that brought down several Dutch Government websites for most of Tuesday was caused by a major cyber attack. The outage began […]

Pierluigi Paganini February 11, 2015
Unknown hackers hit Gas Pump Monitoring Systems in the US

Researchers from Trend Micro discovered that unknown hackers have compromised  Gas Pump Monitoring Systems in the US … it’s security emergency. Researchers at Trend Micro and many other security firms have observed a significant increase in the number of cyber attacks against systems in oil and energy industries. Another worrying trend observed by the experts is […]

Pierluigi Paganini February 10, 2015
Memex – The new search tool to dig also in the Deep Web

DARPA has publicly presented for the first time a new set of search tools called Memex which will improve also researches into the “Deep Web”. In 2014, the U.S. Defense Advance Research Projects Agency (DARPA) launched a the MEMEX project to design advanced search tools that could be also used to scan the deep web, which isn’t indexed by […]

Pierluigi Paganini February 10, 2015
Volume License Trojan Chanitor targets enterprises

Cisco experts discovered a phishing campaign that is spreading fake Volume License Trojan Chanitor to corporate users and is able to evade sandboxes. A few weeks ago, multiple Cisco Managed Threat Defense (MTD) customers received an email that appeared as sent by the Microsoft Volume Licensing Service Center (VLSC), which contains a link to login to the […]