Hacks in Taiwan security conference has uncovered a malware-based attack involving several online games to spread the PlugX RAT. Experts at Trend Micro have spotted a new malicious campaign based on the popular PlugX RAT, the threat actor behind the attack has bundled the malware with League of Legends (LoL) and Path of Exile (PoE) […]
Database of the Lizard Stresser DDoS tool proposed by the Lizard Squad was leaked on like revealing that the group stored client’s credential in plaintext. Last week the another alleged member of the popular Lizard Squad was arrested by UK authorities, the British Police in collaboration with the FBI identified a 18-year-old boy that is […]
FBI seems to consider seriously the list of IP addresses involved in the hack of US CENTCOM social media accounts and provided by members of Anonymous. The FBI is investigating on IP addresses released by the Anonymous collective in a wake of the hijacking of the US CENTCOM social media accounts. Anonymous members have collected the IP […]
Security experts at Blue Coat have discovered that criminal criminals exploited the hashtag #JeSuisCharlie in order to spread the popular DarkComet RAT. Every time there is a clamorous event cyber criminals try to take advantage of the people’s interest to run illegal activities, it is happened recently with the incident to the Air Asia Flight and is […]
SEROCU unit in a joint operation with the FBI arrested a man accused to have been involved in the DDoS attack of Sony Playstation and Xbox systems. The British Police in collaboration with the FBI has arrested a 18-year-old boy that is suspected to have participated to the DDoS attacks on the PlayStation Network and Xbox […]
Experts at Sucury firm have analyzed a malvertising scheme that has hijacked at least two distinct Google AdWords advertising campaigns. Malvertising campaigns are one of privileged attack vector exploited by criminal crews, their efficiency depends on the ability of attackers to compromise large audience channels. In September 2014 Malwarebytes firm discovered a large scale malvertising campaign exploiting Googleâs […]
 Researchers at IBM Trusteer discovered a new toolkit dubbed KL-Remote that allows criminals to run Remote Overlay Attacks without specific skills. It is even more simple for cyber criminals to arrange scams and conduct illegal activities thanks the offer in the cyber criminal ecosystem, for example KL-Remote is a newborn toolkit that could be used to compromise online banking accounts by […]
Security Experts at Microsoft discovered a new variant of CryptoWall 3.0 ransomware that adopts I2P Anonymity Network for C&C Communications. A new version of CryptoWall ransomware has been detected in the wild by experts at Microsoft, just a week after I reported that Ciscoâs Talos Security Intelligence and Research Group detected a new strain of the same […]
Dell SecureWorks detected the Skeleton Key malware, which modifies authentication process on Active Directory (AD) systems protected by only passwords. The experts at Dell SecureWorks Counter Threat Unit(TM) (CTU) have recently discovered a malware dubbed Skeleton Key that bypasses single-factor authentication on Active Directory (AD) systems. The attackers can use to have total access to remote […]
The newborn Silk Road Reloaded black marketplace adopts I2P Anonymous Network and different virtual currency scheme to protect illegal business. The Operation Onymous conducted by law enforcement allowed the seizure of dozens of black markets on Tor Networks. While all the underground marketplaces in the DeepWeb, including Silk Road 2.0, went down due to the operation of […]