Malware

Pierluigi Paganini March 01, 2017
Dridex v4, the dreaded malware has been improved with AtomBombing technique

Malware author are using Dridex v4 in the wild, an improved version of the Trojan that includes a new injection method known as AtomBombing. According to researchers with IBM X-Force, vxers have improved the Dridex banking Trojan adding a new injection method for evading detection, the technique is known as AtomBombing. The researchers have spotted […]

Pierluigi Paganini February 28, 2017
The Gamaredon Group is back with new weapons in its arsenal

The Russian state-actor dubbed Gamaredon is back and has been using a custom-developed malware in a new cyber espionage campaign. According to the experts from Palo Alto Networks, a Russian state-actor dubbed Gamaredon has been using a custom-developed malware in cyber espionage campaign on the Ukrainian government, military and law enforcement officials. The Gamaredon APT was first spotted in […]

Pierluigi Paganini February 27, 2017
The Necurs botnet is evolving, now includes a DDoS module

The Necurs botnet is evolving and recently the experts at BitSight’s Anubis Labs discovered that it was improved to launch DDoS attacks. The Necurs botnet continues to evolve and recently it was used by crooks not only to spread the dreaded Locky ransomware but he was improved to launch DDoS attacks. According to the researchers BitSight’s […]

Pierluigi Paganini February 26, 2017
Shamoon 2 malware, ASERT has shed light on the C2 and the infection process

The analysis conducted by Arbor Networks on the Shamoon 2 malware has shed light on the control infrastructure and the infection process. Security researchers from Arbor Networks’ Security Engineering and Response Team (ASERT) have conducted a new analysis of the Shamoon 2 malware discovering further details on the tools and techniques used by the threat […]

Pierluigi Paganini February 25, 2017
Apple internal development servers compromised by a malware

Apple’s design lab internal development servers was infected by a malware so the company ended its relationship with Supermicro server supplier. It was mid-2016 when Apple’s design lab internal development servers was infected by a malware that was masquerading as a fake firmware patch. In response to the security incident, Apple purged its data centers of […]

Pierluigi Paganini February 23, 2017
UK police arrested the alleged mastermind of the MIRAI attack on Deutsche Telekom

The prosecutor’s office in Cologne and the Federal Criminal Police Office have arrested the alleged mastermind of the MIRAI attack on Deutsche Telekom The agents at the UK National Crime Agency (NCA) have a man that is suspected to be involved with the massive attack on Deutsche Telekom that affected more than 900k routers in […]

Pierluigi Paganini February 23, 2017
Filecoder is the new MacOS ransomware distributed through bittorrent

A few days ago experts at antivirus firm ESET spotted a new MacOS ransomware, a rarity in the threat landscape, but it has a serious problem. Malware experts from antivirus vendor ESET have discovered a new file-encrypting ransomware, dubbed OSX/Filecoder.E, targeting MacOS that is being distributed through bittorrent websites.“Early last week, we have seen a new ransomware campaign for […]

Pierluigi Paganini February 21, 2017
Experts at BAE Systems found false flags in the Lazarus malware

Security experts who analyzed the malware used in the attacks against the Polish banks discovered false flags in the Lazarus malicious code. A few weeks ago, security experts reported that the systems of several Polish banks were targeted by hackers. The systems were infected with a malware after their staff visited the site of the […]

Pierluigi Paganini February 20, 2017
TeamSpy malware is back, it transforms TeamViewer into a spying software

Security experts from Heimdal Security discovered a new spam campaign over the weekend leveraging the TeamSpy malware to spy in victims. Security experts from Heimdal Security have uncovered a new spam campaign emerged over the weekend. The crooks used the notorious TeamSpy malware to gain full access to the target computers. It’s a long time we have no […]

Pierluigi Paganini February 20, 2017
Here you are the distribution network behind the Ursnif banking Trojan

The security experts at Palo Alto Networks published a detailed analysis of the architecture used to spread the Ursnif banking Trojan worldwide. Malware researchers from Palo Alto Networks are monitoring the diffusion of the Ursnif banking Trojan worldwide and have identified the architecture used to spread it. The Ursnif Trojan is spread via spam emails that contain […]