Malware

Pierluigi Paganini June 07, 2016
Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET security Tool. Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a free security tool designed by Microsoft to implement a supplemental security layer of defense against the exploitation of vulnerabilities affecting applications running on Windows Systems. […]

Pierluigi Paganini June 04, 2016
FastPOS PoS malware implements a quick exfiltration method

Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration technique. Security experts at Trend Micro have spotted a new strain of PoS malware dubbed FastPOS that is able to quickly exfiltrate harvested data. The malware was used by threat actors to target both enterprises and SMBs […]

Pierluigi Paganini June 03, 2016
Ransomware campaigns … how to net $90,000 per year

Experts at Flashpoint published an interesting analysis of a ransomware campaign organized by a small gang of cyber criminals. Cybercrime is a profitable business, last week we reported that according to security experts at Check Point, the creators of the Nuclear EK are gaining nearly 100K USD each month, most victims are in Europe and […]

Pierluigi Paganini June 03, 2016
10,000+ WordPress websites compromised due to a flaw in WP Mobile Detector plugin

More than 10,000 WordPress installations being exploited in the wild due to a vulnerability in the  WP Mobile Detector plugin. Security experts at Sucuri reported that a growing number of WordPress installations have been compromised by hackers exploiting a security flaw in a widely used plugin called WP Mobile Detector. The worrisome news is that […]

Pierluigi Paganini June 02, 2016
IRONGATE, a mysterious ICS Malware discovered in the wild

Experts at FireEye spotted IRONGATE a mysterious strain of malware that appears to be designed to target industrial control systems (ICS). Security researchers at FireEye have spotted a new strain of malware IRONGATE has been designed to compromise industrial control systems (ICS). The malicious code was designed to manipulate a specific industrial process in a simulated Siemens control […]

Pierluigi Paganini June 02, 2016
New evidence links the NK Lazarus Group to SWIFT banking attacks

The Analysis of SWIFT attacks revealed five additional pieces of malware containing portions of code shared by Lazarus Group. While security experts continue to investigate the cyber heists that involved SWIFT systems, new evidence collected by a senior security researcher from Anomali Labs link the malware to the North Korean hacker crew known as Lazarus Group. The expert discovered that five […]

Pierluigi Paganini May 31, 2016
Self-propagating ransomware spreading in the wild

Be careful, Microsoft is alerting all Windows users of a new type of a Self-propagating ransomware that exhibits worm-like behavior to propagate itself. Microsoft is alerting all Windows users of a new type of ransomware that exhibits worm-like behavior. “We are alerting Windows users of a new type of ransomware that exhibits worm-like behavior. This […]

Pierluigi Paganini May 30, 2016
Android 6.0 Marshmallow permission-granting model is under attack

Malware researchers are warning Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. The model  will let users grant permissions only when it is required by the app, rather be accepting all […]

Pierluigi Paganini May 30, 2016
Highly targeted ransomware campaign hit Swedish Telia customers

According to a new analysis published by experts at Heimdal Security a new Ransomware campaign targeted millions by spoofing Telco giant Telia. Ransomware continues to represent one of the most insidious and aggressive cyber threats, a new campaign launched by threat actors in the wild is impersonating the telecom giant Telia. According to the experts at the […]

Pierluigi Paganini May 28, 2016
Wekby APT group leverages DNS requests for C2 communications

PaloAlto Networks has spotted a new campaign conducted by the Wekby APT that leverages on a malware that uses DNS requests for C2 communications. Security experts at Palo Alto Networks have spotted a China-linked APT group that has been using a strain of malware that leverages DNS requests for command and control (C&C) communications. The group […]