Cyber Crime

Clearsky detected Gholee malware – The Israel-Gaza Conflict Takes to the Cyber-ArenaClearsky detected Gholee malware – The Israel-Gaza Conflict Takes to the Cyber-Arena

Clearsky detected Gholee malware – The Israel-Gaza Conflict Takes to the Cyber-Arena

Experts at Clearsky detected the Gholee virus which was likely developed by highly qualified factors, which may even be related…

11 years ago
TrendMicro detected a malware bypasses Chrome Extension Security FeatureTrendMicro detected a malware bypasses Chrome Extension Security Feature

TrendMicro detected a malware bypasses Chrome Extension Security Feature

Experts at TrendMicro detected a new click fraud campaign based on a malware able to bypass the Chrome Extension Security…

11 years ago
EPPB tool copies usable to download victims’ data from iCloud backupsEPPB tool copies usable to download victims’ data from iCloud backups

EPPB tool copies usable to download victims’ data from iCloud backups

Copies of the Elcomsoft EPPB tool are circulating in the underground and could have been used in the recent leak…

11 years ago
APT ported XSLCmd Backdoor on OS X according to FireEyeAPT ported XSLCmd Backdoor on OS X according to FireEye

APT ported XSLCmd Backdoor on OS X according to FireEye

Security Experts at FireEye Lab discovered a new variant of the XSLCmd backdoor that has been used in targeted attacks…

11 years ago
Chinese criminal underground is doubled between 2012 and 2013Chinese criminal underground is doubled between 2012 and 2013

Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground. Chinese…

11 years ago
The rapid growth of the Darknet black marketsThe rapid growth of the Darknet black markets

The rapid growth of the Darknet black markets

The Digital Citizen's Alliance provided an updating to the study which analyzes online black markets, focusing on the sales of…

11 years ago
IptabLes and IptabLex botnet targeting Linux servers to run large-scale DDoS attacksIptabLes and IptabLex botnet targeting Linux servers to run large-scale DDoS attacks

IptabLes and IptabLex botnet targeting Linux servers to run large-scale DDoS attacks

Experts at Akamai-Prolexic discovered a botnet dubbed IptabLes and IptabLex that infects and exploits poorly-maintained Linux servers to run DDoS…

11 years ago
AlienVault discovered Watering Hole attacks using Scanbox for reconnaissanceAlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several…

11 years ago
Analyze VirusTotal Metadata to profile hackersAnalyze VirusTotal Metadata to profile hackers

Analyze VirusTotal Metadata to profile hackers

An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad…

11 years ago
Brazilian cyber criminals targeting home routersBrazilian cyber criminals targeting home routers

Brazilian cyber criminals targeting home routers

Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers…

11 years ago