Cyber Crime

Pierluigi Paganini April 09, 2015
AlienSpy RAT exploited to deliver the popular Citadel Trojan

Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]

Pierluigi Paganini April 08, 2015
How Russians hackers breached the White House unclassified network

According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]

Pierluigi Paganini April 08, 2015
FAA systems hit by malware-based attack earlier 2015

According to officials at the Federal Aviation Administration (FAA), hackers earlier this year targeted the Agency network with a malware. It’s official, the network of the Federal Aviation Administration (FAA) was targeted early 2015 by unknown hackers. According to FAA officials, the threat actors used a malware to compromise the infrastructure of the agency. “In early February, the FAA […]

Pierluigi Paganini April 08, 2015
Anonymous collective hit Israel as part of opIsrael 2015

Anonymous hit numerous Israeli websites as promised in a video message posted a few days ago, which was threatening Israel with “the electronic holocaust.” As promised hackers belonging to the Anonymous collective have hit Israeli websites. Last week Anonymous hacktivists published a video online threatening Israel with “the electronic holocaust.” The voice in the video […]

Pierluigi Paganini April 07, 2015
Data Breach – Hackers violated a server at Linux Australia

The organization Linux Australia revealed that one of its servers was hacked. The personal data of conference attendees might have been exposed. Linux Australia revealed a data breach occurred on March 22, according to the organization attackers may have accessed personal details of conference attendees. Linux Australia is an organization that represents nearly 5,000 Australian users […]

Pierluigi Paganini April 06, 2015
Home Office – Cybercrime goes unpunished in the UK

British law enforcement is in difficulty facing the cybercrime, just one computer hacker a month convicted of cyber crime out of 100,000 incidents a year. Cybercrime is becoming very attractive for ordinary crime, high earnings, limited risks than other criminal activities and poor perception of crime are among the elements that are facilitating the rapid spread of […]

Pierluigi Paganini April 06, 2015
Another phishing scam is targeting Yahoo users

A new phishing scam is targeting Yahoo users worldwide, this campaign could be ineffective if we share awareness about bad actors’ TTPs. A new large-scale scam is trying to deceive Yahoo users that are receiving a phishing email that asks for “Yahoo Account Confirmation.” The phishing email claims to be sent by Yahoo, it requests […]

Pierluigi Paganini April 04, 2015
Abusing block chain to share illegal data, including pedo material

The international criminal police organisation Interpol and private researchers discovered a severe flaw in block chain used by virtual currencies. INTERPOL cyber threat researchers, including members of the Kaspersky Lab, have identified a serious vulnerability in the virtual currencies schema. The flaw resides in the ‘block chain’ related to virtual transactions and it could be exploited to […]

Pierluigi Paganini April 03, 2015
Eastern European Cyber-gang manages a new Dyre Wolf campaign

Security experts from IBM discovered a very sophisticated malware campaign based on the Dyre Trojan to hack Corporate Bank Accounts. IBM has uncovered an important cyber criminal operation dubbed The Dyre Wolf due to the name of the popular Dyre malware used crooks. The Dyre malware was discovered in the wild by several security firms, […]

Pierluigi Paganini April 03, 2015
TrendMicro spotted a 64-Bit variant of NewPosThings PoS malware

Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]