Cyber Crime

Pierluigi Paganini May 16, 2014
DDoS Protection Services hacked to arrange powerful DNS DDoS attack

Security Experts at Incapsula have recently detected a powerful DNS DDoS attack organized by attackers abusing DDoS Protection Services servers. Experts at Incapsula have detected early this month a powerful DNS DDoS attack that was launched from high-capacity servers, but the alarming news is that the attackers have abused resources of two separate DDoS protection service […]

Pierluigi Paganini May 15, 2014
A new phishing scheme is being used to steal Google Account credentials

Security experts at Bitdefender discovered a new ingenious phishing scheme that is being used by hackers to steal Google Account credentials. Security experts at Bitdefender have discovered a news phishing scheme adopted by hackers to steal Google Account passwords. The new phishing attack is hard to catch with traditional heuristic detection, it mainly affects Google Chrome and […]

Pierluigi Paganini May 13, 2014
Ajax Security Team lead Iran-based hacking groups

FireEye published a report titled “Operation Saffron Rose” to document the activities of the Iranian hacking group named Ajax Security Team According to a recent report titled “Operation Saffron Rose” published by cybersecurity company FireEye, a group called the Ajax Security Team is the principal Iranian hacking group, it is responsible for different espionage campaigns on custom-built malicious software. “This group, which […]

Pierluigi Paganini May 13, 2014
Hackers have stolen files on Ukraine crisis from Belgian Foreign Ministry

Unknown hackers have stolen files on the Ukraine crisis from the Belgian Foreign Ministry, causing the crackdown of targeted servers. A new cyber espionage campaign hit the Belgian foreign ministry, unknown hackers have stolen data related to the Ukraine crisis last week. The cyber attack has caused the crackdown of targeted servers which has left diplomats without […]

Pierluigi Paganini May 09, 2014
Alleged members of hacking Team Digi7al arrested for violating government networks

Alleged members of the hacking Team Digi7al were arrested by NCIS and charged for Hacking more than 30 government and private sites. The US attorney’s Office in Tulsa charged two men for involvement in anti government conspiracy, they are accused to have violated the computer systems of dozens of government and commercial organizations, including the […]

Pierluigi Paganini May 07, 2014
Orange hacked for the second time in the year, 1,3M records exposed

French telecom giant Orange has suffered the second data breach of the year on April 18th. Hackers violated its website stealing 1,3 customer records. Orange company was hit again by hackers, client database was breached by unknown attackers which have stolen the personal information on 1.3 million customers. According first news on the incident the hackers […]

Pierluigi Paganini May 07, 2014
Shiqiang APT cyber espionage using RAT signed with stolen certificates

Security experts at McAfee Labs have discovered a new cyber espionage based on the malware digitally signed with stolel certificates. A recent research of McAfee Labs has identified a series of spear phishing attacks against non governmental entities and activists, the offensives which interested mainly organizations in China were conducted using malicious code signed with stolen digital […]

Pierluigi Paganini May 05, 2014
RedSocks, An interesting vision on Malware trend in Q1

Dutch malware detection company RedSocks has issued its first Malware Trend Report related to the malicious code trends observed in the first quarter of 2014. RedSocks, a Dutch malware detection company which provides netflow-based malware detection service, has published its first Malware Trend Report Labs related to the first quarter of 2014. The report provides precious insights into the trends […]

Pierluigi Paganini May 04, 2014
Using lnk file to deceive users in phishing attacks

Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting  .lnk files. Phil Hay, expert at Trustwave SpiderLab, explained how cyber criminals  are using .lnk files to serve malware via email. I have chosen to detail this tactic to demonstrate how much creative is the criminal ecosystem, even if it […]

Pierluigi Paganini May 03, 2014
Understanding Hit and Run DDoS attacks

Hit and Run DDoS attacks are composed by a series of short bursts of high volume attacks, having a limited duration, and are arranged periodically, and … Incapsula firm has recently published a blog post to explain the efficiency of hit and run DDoS attacks, as remarked by the experts attackers don’t need to arrange large scale […]