Malware

Pierluigi Paganini July 15, 2015
FBI paid Hacking Team to identify Tor users

Documents leaked online after the Hacking Team data breach revealed that the company supported the FBI in the investigation on Tor users. While the security experts are continuing to analyze the impressive amount of data stolen from the Hacking Team, new revelation are circulating over the Internet. Among the clients of the Italian security firm, there […]

Pierluigi Paganini July 15, 2015
Hacking Team Spyware uses a UEFI BIOS Rootkit to gain persistence

Documents leaked online after the Hacking Team hack revealed that the company used a UEFI BIOS rootkit to gain persistence for its spyware software. The recent data breach suffered by the surveillance firm Hacking Team is shocking the IT security industry, the hackers leaked company emails, source codes and contracts revealing uncomfortable truths. Security experts mainly […]

Pierluigi Paganini July 15, 2015
Hacking Team will be back to business soon

The Hacking Team CEO David Vincenzetti announced that the popular surveillance company will be back to business vert soon, but experts have many doubts. After the embarrassing data breach suffered by the Hacking Team, the surveillance company plans to rebuild the “empire”. The hackers likely haven’t stolen the entire intellectual property of the firm, which […]

Pierluigi Paganini July 14, 2015
Here’s how Hacking Team was selling products as RCS

400 GB data library revealed that the hacked Italian surveillance firm “Hacking Team” used to sell its RCS via a reseller network over the globe. Major resellers are located in America, Latin America, UAE, Israel and their own hometown Italy. Due to rising demand of hacking and surveillance software worldwide, many security agencies and firms […]

Pierluigi Paganini July 14, 2015
Seaduke, another weapon in the Duke arsenal

Security researchers at Symantec have analyzed Seaduke, a sophisticated Trojan used by threat actors behind the “Duke” malware family. Security experts at Symantec security firm have analyzed the Trojan.Seaduke, a malware that was used by the APT group behind the Duke espionage campaigns that targeted numerous government organizations worldwide. The Seaduke has many similarities with other […]

Pierluigi Paganini July 14, 2015
Hacking Team, the third Flash Zero-Day is out: CVE-2015-5123

Following the Hacking Team data breach, the security researchers discovered the third Adobe Flash Player zero-day vulnerability. A third Adobe Flash Player zero-day has been discovered since the HackingTeam breach. Thanks to the breach of the Hacking Team‘s private files, the third Adobe Flash zero-day has been made publicly accessible. “After two Adobe Flash player zero-days disclosed […]

Pierluigi Paganini July 13, 2015
1 Million Android Users were infected by Gaming Apps

Researchers discovered a malicious Android Trojan disguised as gaming app that was served through the official Google Play more than 1 Million times. We already explained that Google Play Store was abused several times to serve malicious applications, a practice that is very common and everyday new bogus apps are proposed on the official store […]

Pierluigi Paganini July 12, 2015
Hacking Team Another Flash Zero-Day: CVE-2015-5122

Following the Hacking Team data breach, yet another Adobe Flash Player zero-day vulnerability has been found actively exploited in-the-wild. Another Flash Zero-Day: CVE-2015-5122 Yet another Adobe Flash Player zero-day has been found actively exploited in-the-wild. Thanks to the breach of the HackingTeam’s private files, another Adobe Flash zero-day has been made publicly accessible and hackers […]

Pierluigi Paganini July 12, 2015
Security Affairs newsletter Round 17 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Anonymous India hacked BSNL website and compromised more than 30 Million records Cisco Unified CDM platform open to cyber attacks Argentine finds messenger to shoot after e-vote vuln allegations […]

Pierluigi Paganini July 11, 2015
Wekby APT attacks leverage Hacking Team exploits

According to the experts at Volexity the Flash Player exploit has been leveraged in spear phishing campaign launched by the Wekby APT. As anticipated, several criminal gangs included the code for the exploitation of CVE-2015-5119 vulnerability in their exploit kits, let’s remember that the exploits code was disclosed as the result of the attack against the Hacking […]