On December 16th the Iranian Maher center issued an advisory warning of a new “targeted data wiping” malware discovered during an investigation. First analysis of the center revealed that the malicious code has a simple as efficient design that allow it to wipe files on different drives in various predefined times. The malware wipes disk partitions […]
Last summer a series of cyber attacks hit energy sector, one of the worldâs largest oil companies the Saudi Aramco was attacked by a group named the Cutting Sword of Justice. Hackers used the Shamoon malware to attack the systems of the company, fortunately, production environment wasn’t impacted. The malware is able to wipe files from […]
Cyber espionage is worldwide recognized one of the most concerning cyber threats mainly operated by governments to steal sensible information to foreign states and private companies. FireEye has revealed a cyber espionage campaign, named “Sanny“, attributable to Korea that hosts command-and-control (C&C) servers used in the attacks, the C&C channel is embedded on a legitimate page […]
Social networks are platforms that have monopolized majority of userâs internet experience, the imperative is to âsocialâ, and everybody share an incredible amount of personal information exposing its digital identity to serious risks. An element of attraction for cyber criminals is the huge number of services, from gaming to payments, that are developing on these […]
Cyber warfare scenario is rapidly changing, governments all around the world are investing to increase their cyber capabilities and designing new tools to adopt in cyberspace to face with opponents in what is considered the fifth domain of warfare. The warfare scenario is deeply changed, new actors fight in the cyberspace an asymmetric war with […]
Governments all around the world are committed for the definition of a proper cyber strategy that represents an optimum balance between a good cyber offense and an efficient cyber defense. Cyber conflicts are characterized by the necessity of an immediate cyber response to the incoming cyber threats, in many cases the reaction must be […]
French weekly news magazine L’Express has reported that offices of France’s former president Sarkozy were hit by a cyber espionage campaign back in May 2012. Few days before the second round of the presidential election won by Hollande the Presidentâs office was infected by Flame malware, within the compromise PCs also the one of Sarkozyâs […]
Last week I attended the third Annual Information Warfare Conference, an interesting opportunity to understand the evolution of cyber warfare scenario specifically for my Italian context. One of the main reflection raised is the limited knowledge on the social-economic impact of the concept of cyber weapon, the majority of governments are currently working to improve […]
Article published on The Malta Indipendent on October 11th 2012 Pierluigi Paganini, David Pace, Publishers of mainstream ICT news are ablaze with articles on the evolution of the âFlameâ malware targeting the Middle East region for cyber espionage purposes, and new menaces such as Gauss or Shamoon. No longer the province of deviant black-hat hackers or […]
Time passes and the dispute between Iran and Israel is becoming increasingly more complex to manage. Apparently everything seems crystallized waiting for one of the contenders make the first move, in fact, both states are boosting investment in the development of their cyber capabilities. The cyberspace is the domain in which both countries are trying to offend […]