APWG published the interesting study APWG Mobile Financial Fraud report on the underground marketplace that revealed the explosion of prolific mobile fraud malware market. The APWG Mobile Financial Fraud report resumed The Anti-Phishing Mobile Working Group investigating on the expansion of the black market for mobile malicious code, the study is crucial to understand the evolution of criminal activities […]
When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks, but underground offers much more. When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks such as the popular LOIC, we must consider that underground offer […]
ESET security firm found a mysterious instance of Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication Early this year ESET security firm detected the Avatar rootkit (Win32/Rootkit.Avatar), a mysterious malware advertised as rootkit by Russian cybercrime on specific forums. “We present you here previously announced product. In connection with work on other projects, […]
APWG issued the new edition of its APWG Global Phishing Survey report that identifies trends and their significance by quantifying the scope of the global phishing problem. The APWG Global Phishing Survey report analyzes phishing attacks detected in the second H2 2012, the overall data for the study was collected by the Anti-Phishing Working Group, and supplemented with […]
Securi security firm detected a new sophisticated Apache backdoor used to hijack traffic to malicious website serving the popular Blackhole exploit kit. Securi security firm detected a new sophisticated Apache backdoor used to hijack traffic to malicious website serving the popular Blackhole exploit kit. The company published a blog post describing the new Apache backdoor that according […]
FireEye report on the evolution of sophisticated cyber threats and their diffusion on global scale FireEye security firm has published another interesting report, titled “FireEye report -The Advanced Cyber Attack Landscape”, that provides an overview of advanced cyber attack landscape, these events are a widespread global activity and during 2012. FireEye experts detected 12 million malware communications seeking instructions, […]
Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of the growing interest in monetization malicious codes such as malware, ransomware and more in general botnets. One of the most targeted sector is banking, the evolution of banking services, their introduction on mobile platforms made attractive targets for cyber criminals, one […]
Verizon has issued the “2013 Data Breach Investigations Report” that investigates on a series of documented data breaches. Verizon’s RISK Team, in collaboration with other 18 partners, has issued the “2013 Data Breach Investigations Report” that investigates on a series of documented data breaches. Since 2008 the company yearly publishes data related to principal incidents occurred during […]
In the last months of 2012 a group of hackers known as “Izz ad-Din al-Qassam Cyber Fighters” conducted a series of attacks against principal banking and financial institutions including the U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks. Security experts noted that the hackers adopted an anomalous strategy for the […]
When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and […]