Cyber Crime

Pierluigi Paganini March 20, 2014
FireEye discovered Android spying components in Winspy RAT

FireEye experts investigating on a spear-phishing campaign on an US-based financial institution discovered that common WinSpy RAT was adapted to hit Android devices. FireEye Security Researchers have recently identified a new variant of Winspy RAT that can infect users’ PC and also their Android Devices during synchronization operations. We have a long discussed about the increment for […]

Pierluigi Paganini March 19, 2014
Linux Operation Windigo hit 500000 PC and 25000 dedicated servers

Antivirus Firm ESET has been tracking and investigating the operation behind Linux_Ebury uncovering a sophisticated campaign called Operation Windigo. Operation Windigo is the name of a sophisticated malware-based campaign uncovered by security Experts at ESET, that exploiting the Linux/Ebury backdoor has impacted more 500,000 computers and 25,000 dedicated servers. ESET Researchers collaborated with CERT-Bund, the European Organization […]

Pierluigi Paganini March 18, 2014
Google Public DNS Server Traffic Hijacked, Millions users impacted

Google DNS public server was hijacked yesterday for 22 minutes, the victims were hijacked to the Latin America division of BT in Venezuela and Brazil. Google is undoubtedly the main targets for hackers, its services are accessed daily by billions of Internet users, a wide audience desirable for attackers. The last successfully attack against Google […]

Pierluigi Paganini March 17, 2014
Bitcoin stealer malware disguised as application to access MtGox DB

The MtGox data leaked by the popular exchange was invented by hackers to infect a large audience with a Bitcoin stealer malware. Last month the biggest MtGox exchange filed for bankruptcy after it lost nearly 850,000 Bitcoins, it is a fraud, according an unknown hacker who breached into the personal blog and Reddit account of MtGox CEO, Mark Karpeles. As usual […]

Pierluigi Paganini March 15, 2014
A sophisticated phishing scheme is targeting Google Docs Users

Security Researchers at Symantec detected a new Sophisticated Phishing Scam that is targeting the Google Docs Users with complex social engineering tricks. Phishing is still considerable as one of the major cyber threats, its impact on the IT industry is devastating considering that attackers are adopting new techniques even more sophisticated.  Principal security firms and CERTs […]

Pierluigi Paganini March 14, 2014
TURBINE, how NSA has plundered botnets to the cybercrime

TURBINE is the codename for a sophisticated hacking platform to take control of C&C servers managed by cybercrime. The NSA has been hijacking the botnets managed by cybercrime to its own purpose, this is the last revelation on questionable activities of the agency. Also this last revelation is based on documents leaked by Snowden, the news was […]

Pierluigi Paganini March 10, 2014
Anonymous hackers hacked MtGox CEO publishing evidence of fraud

A group of anonymous hackers violated the personal blog and Reddit account of the MtGox CEO Mark Karpeles on Sunday. They claim to publish evidence of fraud. Bitcoin community was shocked by recent MtGox data breach, the Bitcoin exchange shuts down after it had announced to have suffered technical issues that forced the exchange to suspend […]

Pierluigi Paganini March 10, 2014
The marketing approach of cybercrime to phishing emails

Mark Sparshott, director at Proofpoint, explained that cybercrime manages phishing emails using techniques similar to those used by the marketing industry. Phishing is still considerable on of principal cyber threats for Internet users, it is even more used to spread malware and link to compromised websites, for this reason cybercriminals are adopting new and innovative […]

Pierluigi Paganini March 09, 2014
DNS amplification botnet available in the underground

Security expert Dancho Danchev profiled a recently released DNS amplification DDoS service available for sale in the underground. Recently the cyber security expert Dancho Danchev profiled new DNS amplification DDoS bot available in the underground, a privileged attack tool for the criminal ecosystem. DDoS attacks observed last year were characterized by an increased magnitude because attackers adopted new techniques […]

Pierluigi Paganini March 08, 2014
Tor network is increasingly attractive for cybercrime

Cyber criminals are abusing even more Tor Network for illegal activities, from botnet management to money laundering, the number of services is increasing. Tor network is even more used by cyber criminals to cover their illegal activities, the Tor community has observed, for example an alarming increase in the number of malware that abuse of […]