Cyber Crime

Attacks on ISP Networks allows to steal $83,000 from Bitcoin Mining poolsAttacks on ISP Networks allows to steal $83,000 from Bitcoin Mining pools

Attacks on ISP Networks allows to steal $83,000 from Bitcoin Mining pools

Researchers at Dell SecureWorks Counter Threat Unit discovered a theft of Bitcoin made hijacking networks of at least 19 Internet…

11 years ago
Poweliks the persistent malware which doesn’t install any filePoweliks the persistent malware which doesn’t install any file

Poweliks the persistent malware which doesn’t install any file

Experts at GData discovered Poweliks, a persistent malware able to infect machines without installing any files on the targeted machine.…

11 years ago
FBI infected PCs on a large scale to persecute alleged criminalsFBI infected PCs on a large scale to persecute alleged criminals

FBI infected PCs on a large scale to persecute alleged criminals

A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines…

11 years ago
Russian crime ring amasses over a Billion credentialsRussian crime ring amasses over a Billion credentials

Russian crime ring amasses over a Billion credentials

Experts at Hold Security firm discovered a Russian group of hackers that collected 1.2B stolen credentials obtained in different data…

11 years ago
China bans Symantec & Kaspersky from the list of antivirus suppliersChina bans Symantec & Kaspersky from the list of antivirus suppliers

China bans Symantec & Kaspersky from the list of antivirus suppliers

China has excluded Symantec Corp and Kaspersky Lab from a list of approved antivirus software suppliers to limit the use…

11 years ago
Sophisticated Phishing is targeting French-Speaking banking usersSophisticated Phishing is targeting French-Speaking banking users

Sophisticated Phishing is targeting French-Speaking banking users

A very sophisticated phishing campaign has been discovered by Malcovery Security, it targets French-speaking computer users to steal banking credentials.…

11 years ago
Al-Qaeda usage of encryption after Snowden leaks (Part 2)Al-Qaeda usage of encryption after Snowden leaks (Part 2)

Al-Qaeda usage of encryption after Snowden leaks (Part 2)

Web Intelligence experts at Recorded Future issued the second part of the analysis on the usage of encryption by Al-Qaeda…

11 years ago
Kaspersky report on Energetic Bear – Crouching Yeti APT campaignKaspersky report on Energetic Bear – Crouching Yeti APT campaign

Kaspersky report on Energetic Bear – Crouching Yeti APT campaign

The Kaspersky Lab Team has issued a report which includes details of the investigation related to the Energetic Bear –…

11 years ago
Chinese Hackers Comment Crew stole plans of Iron Dome Defense SystemChinese Hackers Comment Crew stole plans of Iron Dome Defense System

Chinese Hackers Comment Crew stole plans of Iron Dome Defense System

CyberESI firm revealed that Chinese hackers members of the Comment Crew group violated the corporate networks of top Israeli defense…

11 years ago
Misusing Digital CertificatesMisusing Digital Certificates

Misusing Digital Certificates

Excerpt from the post "How Cybercrime Exploits Digital Certificates" which details means and motivation of illicit activities which abuses digital…

11 years ago