Cyber Crime

Pierluigi Paganini December 27, 2014
Lizard Squad hit the Tor network, after Christmas attacks on Sony PSN and XBox Live networks

Members of the hacking group Lizard Squad, which have paralyzed the networks of Xbox live and PlayStation PSN, now have targeted the Tor network. The hacking collective Lizard Squad that has paralyzed the Play Station Network and Xbox live networks at Christmas now seems to concentrate its efforts on the popular anonymizing Tor network. In time I’m […]

Pierluigi Paganini December 26, 2014
Lizard Squad took down again Sony PSN and Xbox Live networks

Hackers belonging to the Lizard Squad team have taken down at Christmas the online networks of both Microsoft Xbox Live and PlayStation network (PSN). The Lizard Squad hacking team has taken down the online gaming networks of both Xbox Live and PlayStation at Christmas. The attack does not come unexpected, unfortunately, the group Lizard Squad had already […]

Pierluigi Paganini December 26, 2014
Afghanistan CDN network compromised by Chinese hackers

Chinese hackers brought down all major Afghanistan Government websites by hacking an official CDN network used in the country. The experts of the ThreatConnect Intelligence Research Team (TCIRT) recently reported the operation, dubbed Operation Helmand, run by a group of Chinese hackers that attacked the entire Afghan government web network. The hackers allegedly used a targeted cross-site scripting […]

Pierluigi Paganini December 25, 2014
Cybercrime-as-a-Service, a winning model of sale

Security Experts at Sophos explained the efficiency of the business model known as Cybercrime-as-a-Service in the specific case of Vawtrak botnet. The term Cybercrime-as-a-Service refers to the practice in the cybercriminal ecosystem to provide product and services for use by other criminals. In September 2014, a report from Europol’s European Cybercrime Centre (EC3), the 2014 […]

Pierluigi Paganini December 25, 2014
Hackers hit a poorly configured server to breach JPMorgan

Security experts involved in the investigation on the JPMorgan breach revealed that hackers exploited the lack of 2FA to compromise a server in the network. JPMorgan suffered months the biggest U.S. banking breach of all time, and now The New York Times provided more information on the case citing sources close to the experts involved in the […]

Pierluigi Paganini December 23, 2014
Eastern APT group Anunak steals millions from banks

Security researchers discovered a criminal crew called Anunak that has already stolen $17 million from banks, retailers and others firms since 2013. Security companies Group-IB and Fox-IT have conducted a joint investigation on a cyber espionage group called called Anunak, which has been targeting banks and payment systems in Russia and Commonwealth of Independent States countries, […]

Pierluigi Paganini December 22, 2014
Cyber attack on German steel factory caused severe damage

The annual IT security report issued by the German BSI reported that a sophisticated cyber attack on a steel factory caused severe damage. A cyber attack could cause serious damage to a production plant or a facility, we discussed several times this attack scenario that represents a nightmare for security experts and Intelligence agencies. The […]

Pierluigi Paganini December 22, 2014
Chthonic, a new strain of ZeuS trojan hits 150 banks worldwide

A new strain of Zeus Trojan dubbed Chthonic has been discovered in the wild targeting more than 150 banks and 20 payment systems mainly in Europe. Experts believe they have seen everything about the Zeus trojan, P2P versions, versions that infect SaaS, agents that exploit the Tor network or that recruit money mules … then […]

Pierluigi Paganini December 22, 2014
FBI stated the North Korea hacked Sony Pictures, Pyongyang wants a joint investigation

An announcement by the FBI stated the North Korea hacked Sony Pictures, but Pyongyang refused accusations and offered support for the investigation. The cyber attack against Sony Pictures is monopolizing the attention of the media, in particular, the problem of the attribution is hard to solve. The FBI released the findings of its investigation that definitively […]

Pierluigi Paganini December 21, 2014
Diving in the Illegal Underground Hacking Markets

Experts at Dell Secure Works Counter Threat Unit (CTU) published a new report on the evolution of the hacking underground marketplaces. The monitoring of black hat markets is one the principal activities of security experts and intelligence agencies, it allows information gathering on evolution of cyber threats and emerging trends in the criminal ecosystem. In […]