Malware

Pierluigi Paganini February 18, 2017
Mobile car apps implement poor security measures advantaging car thieves

Experts at Kaspersky Lab have analyzed several Android car apps and discovered that most of them lack proper security features to protect vehicles. Security researchers from antivirus vendor Kaspersky Lab have analyzed seven of the most popular Android apps that allow to remotely control millions of modern cars. The experts discovered that the Android apps, whose name […]

Pierluigi Paganini February 17, 2017
The ViperRAT APT group is targeting the Israeli Defense Force

A group of hackers tracked as ViperRAT is spying on the Israeli military by hacking into the soldiers’ personal Android mobile devices. A group of hackers, tracked as ViperRAT, is spying on the Israeli military by hacking into the soldiers’ personal Android mobile devices to track their activities and steal sensitive data. Experts from security firms […]

Pierluigi Paganini February 17, 2017
A new SQL malware Targets online shops running on Magento

Security experts have discovered a new SQL malware targeting online shops running on Magento that hides the code in the website’s database. Security experts have discovered a new strain of malware that is targeted websites raising Russian the Magento eCommerce platform. The novelty is that this is the first a malware that hides the code in the website’s […]

Pierluigi Paganini February 16, 2017
IBM shares details on the attack chain for the Shamoon malware

Security experts at IBM published a report that includes precious details on the attack chain of the dreader Shamoon cyberweapon. The dreaded Shamoon malware, aka Disttrack, has resurrected and government agencies and threat intelligence firms are investigating the recent strings of attacks leveraging the dangerous disk wiper. We detected the Shamoon malware for the first time in August 15th, […]

Pierluigi Paganini February 15, 2017
BitDefender found the first MAC OS version of the X-Agent used by the APT28

Security experts at Bitdefender discovered a MAC OS version of the X-Agent malware used by the Russian APT28 cyberespionage group. Security experts at BitDefender have discovered a MAC OS malware program that’s likely part of the arsenal of the dreaded Russian APT 28 group (aka Pawn Storm, Sednit, Sofacy, Fancy Bear and Tsar Team). The Russian nation-state actor was involved […]

Pierluigi Paganini February 14, 2017
Experts warn of the rapid growth of the Marcher Android banking Trojan

Malware researchers at the security firm Securify have published a detailed analysis of the Marcher Android banking Trojan. Security experts at the Securify have published a detailed analysis of the Marcher Android banking Trojan, a threat that has been around since late 2013. First variants of the malware were developed to trick users into handing over their payment card […]

Pierluigi Paganini February 14, 2017
Office Loader leverages malicious macros to deliver multiple malware

Security researchers at Palo Alto Networks spotted a campaign leveraging Microsoft Office loader using malicious macros to drop multiple malware families. The researchers analyzed more than 650 unique samples of this specific loader since early December 2016, accounting for 12,000 phishing email targeting numerous industries. Most affected industries are High Tech, Professional and Legal Services, […]

Pierluigi Paganini February 13, 2017
Word documents laced with malicious macros used to hack Apple Mac systems

Crooks exploiting Word documents laced with malicious macros to compromise Apple Mac systems exactly in the same way they do with Microsoft machines. It’s amazing the number of Apple Mac users that tell me their systems are immune from malware. This false sense of security is very dangerous and I believe it is important to […]

Pierluigi Paganini February 11, 2017
Kelihos becomes January’s Top 10 ‘Most Wanted’ Malware

The infamous Kelihos botnet climbed to the top position, while the Conficker worm dropped to fourth on the chart of malware. Which are the most active malware in the wild? According to a research conducted by CheckPoint Security, a malware landscape was characterized by some interesting changed in this first part of 2017. The Kelihos botnet […]

Pierluigi Paganini February 10, 2017
CRYSIS Ransomware is back and crooks are using RDP attacks once again

CRYSIS Ransomware attacks leveraging brute force via Remote Desktop Protocol (RDP) are still ongoing, mostly targeting US firms in the healthcare. Do you remember the CRYSIS ransomware? It is a ransomware that appeared in the threat landscape last year, now researchers at Trend Micro discovered the CRYSIS ransomware is being distributed via Remote Desktop Protocol (RDP) brute force […]