Malware

Pierluigi Paganini June 28, 2016
Microsoft Office 365 targeted with massive Cerber ransomware 0-day campaign

Cloud security provider Avanan discovered a number of Cerber Ransomware variants targeting corporate Office 365 users with malicious emails. Cloud security provider Avanan spotted a number of Cerber Ransomware variants that are targeting corporate Office 365 users with spam or phishing emails leveraging on malicious file attachments. Threat actors sent an Office document that embedded malicious macros to download […]

Pierluigi Paganini June 28, 2016
Crooks made $50,000 in a few weeks with CryptXXX Ransomware

Security experts from the firm SentinelOne monitored a recent CryptXXX Ransomware campaign that allowed crooks to make $50,000 in a few weeks. Security experts from security firm SentinelOne have analyzed the activity related to CryptXXX ransomware’s operators. They discovered that the gang made around $49,700 from the payment of ransoms between June 4 and June 21, 2016, the money […]

Pierluigi Paganini June 26, 2016
PunkeyPOS might have already stolen millions of payment card numbers

Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might have already stolen millions of payment card numbers. Experts are continuing to monitor the PunKeyPos malware in the wild, the threat might have already stolen millions of payment card numbers. Security experts from PandaLabs spotted a new strain of the PoS malware dubbed PunkeyPos which seems […]

Pierluigi Paganini June 26, 2016
Locky Ransomware is back! 49 domains compromised!

Locky ransomware starts up again its illegal activity of stealing money from their victims after a temporary inactivity since the end of May. This time, it comes with hard-coded javascript A new Locky campaign appears in the wild with, experts observed million malicious email messages starting from June 20. Researchers at Proofpoint observed that this […]

Pierluigi Paganini June 22, 2016
Pawost Android Malware uses Google Talk to make unwanted phone calls

Researchers at MalwareBytes have spotted a new Android Malware dubbed Pawost that uses Google Talk to make unwanted phone calls. Security experts from MalwareBytes have spotted a new strain of Android malware, dubbed Android/Trojan.Pawost, that implements an unusual feature. The Pawost threat originates from China and is able to use Google Talk to make malicious phone […]

Pierluigi Paganini June 22, 2016
Conficker, the malware with the most wide spread diffusion

Conficker (also known as Downup, Downadup e Kido) is one of the oldest and still active malware, according to Check Point researchers it is  “the most prominent family accounting for 14 percent of recognized attacks.” Conficker is technically a worm that leverages a vulnerability in the Windows Server Service to spread itself, it targets an […]

Pierluigi Paganini June 21, 2016
Exploit kit traffic drops by 96% since April, what is happening?

The exploit kit landscape is rapidly changing,the Angler and Nuclear EK disappeared and overall malicious traffic drops by 96% since April. As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs represent a serious threat to online […]

Pierluigi Paganini June 15, 2016
ScarCruft APT Group exploited Flash Zero-Day in High-Profile attacks

Security experts from Kaspersky Lab revealed that an APT group dubbed ScarCruft exploited the zero day vulnerability (CVE-2016-4171) in Adobe Flash Player. According to the experts from Kaspersky Lab, an APT group dubbed ScarCruft exploited a zero day vulnerability (CVE-2016-4171) in Adobe Flash Player. The group launched a series of attacks against high-profile targets against entities in […]

Pierluigi Paganini June 14, 2016
Watch out, FLocker Ransomware targets Android smart TVs

The day has come, Sharp and Philips smart TV running the Android TV OS could be infected by a ransomware dubbed FLocker ransomware. When a journalist asked me which is a possible evolution of ransomware I had no doubt, the Internet of Things. I was thinking of ransomware that infects medical devices and Smart objects in our homes. […]

Pierluigi Paganini June 11, 2016
How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the Teslacrypt Ransomware variants In May, criminals behind the TeslaCrypt ransomware leaked online the master encryption key that allowed security experts to develop a decryption tool for the last variant of the threat. “In surprising end to TeslaCrypt, […]