Cyber Crime

Pierluigi Paganini February 22, 2014
2013 mobile malware evolution and mobile devices security

Mobile devices security – Lookout proposed an interesting analysis for the mobile threats observed during 2013, specifically for adware and chargeware. Mobile is probably one of most pervasive technology, during 2013 for the first time we saw the overcoming in the number of mobile devices over those desktops in some countries, the downside is that the […]

Pierluigi Paganini February 21, 2014
Zeus variant hit Software-as-a-service applications

Discovered a Zeus variant that implements a web-crawling feature to hit Software-as-a-service applications to obtain access to proprietary data or code This is the second news on Zeus malware in less than a week, previous one was related to a new variant using steganography to hide configuration file, this last discovery is related to a version even more […]

Pierluigi Paganini February 18, 2014
Profiling hacking for hire services offered in the underground

Security expert Dancho Danchev profiled hacking for hire services offered in the underground, providing an indication of their prices. In the past we have already analyzed the diffusion in the underground of hacking for hire services, a term coined to define the sale of hacking services made by cyber criminals for a limited period of time. Surfing […]

Pierluigi Paganini February 16, 2014
Discovered thousands of FTP servers infected by malware

Hold Security reported it has discovered a list of credentials for close to 7,800 FTP servers being circulated in cybercrime forums in the Deep Web. FTP servers are considered a privileged target for cyber criminals, hackers can exploit them for example to spread malware infecting webservers that rely on FTP applications for updates. The Hold Security firm […]

Pierluigi Paganini February 15, 2014
FireEye discovered a new watering hole attack based on 0-day exploit

Security researchers from FireEye have recently  discovered a new IE 10 Zero-Day exploit being used in a watering hole attack. Security experts at FireEye discovered a new IE 10 Zero-Day exploit (CVE-2014-0322) being used in a watering hole attack on the US Veterans of Foreign Wars (VFW) website. The zero-day allows the attacker to modify one byte […]

Pierluigi Paganini February 14, 2014
Cybercriminals target mobile applications with fake SSL Certificates

Cybercriminals targeting mobile applications with fake SSL Certificates to run man-in-the-middle attacks against the affected companies and their customers. There is the wrong conviction that SSL certification user can protect users from be tricked to visit a fake website. Netcraft has uncovered numerous attacks based on fake SSL certificates used to impersonate online banking websites, ecommerce , ISPs and […]

Pierluigi Paganini February 12, 2014
Largest Ever 400Gbps Distributed Denial of Service NTP Amplification attack hit Cloudfare

Largest Ever 400Gbps Distributed Denial of Service NTP Amplification attack hits Europe servers of anti-DDoS protection firm Cloudfare. Despite  the Distributed Denial of Service (DDoS) attack is a type of offensive easy to arrange, it is a very insidious threat for web services. A recent analysis revealed that the Distributed Denial of Service attack are increasing in magnitude […]

Pierluigi Paganini February 11, 2014
The Mask – the most sophisticated APT operation seen to date

Speaking at Kaspersky Lab’s Industry Analyst Summit,Costin Raiu revealed details on The Mask campaign, the most sophisticated operation they’ve seen to date. The Kaspersky team recently announced to have detected a new significant APT campaign dubbed The Mask or “Careto” (Spanish for “Ugly Face” or “Mask”), a group of high-level state-sponsored hackers have been targeting government agencies, […]

Pierluigi Paganini February 10, 2014
CERT POLSKA detected large-scale DNS hacking on home routers

Attackers changed the DNS configuration of vulnerable home routers to conduct man-in-the-middle attacks on a large scale against Polish online banking users. The Polish Computer Emergency Response Team has documented a series of cyber attacks observed in Poland involved cybercriminals hacking into home routers and changing their DNS settings so they can conduct MITM attacks on […]

Pierluigi Paganini February 09, 2014
Cost of conducting APT campaigns is dramatically dropping

Speaking at Kaspersky Lab’s Industry Analyst Summit Costin Raiu, revealed that the cost for APT campaign is dramatically dropping. The cost of developing advanced malware has fallen dramatically malicious code like Stuxnet and Flame are today economically more affordable. It has been estimated that the expense for the development of a cyber weapon like Stuxnet,or for a […]