Malware

Pierluigi Paganini April 15, 2015
Criminal crew Hellsing strikes back after attack by a rival APT group

The elite cyber crime group Hellsing strikes back after attack by the rival APT crew known as Naikon. This is the first documented case of APT-on-APT attack. What happens when an APT group running a cyber espionage campaign target a second distinct APT group? The events occurred last year, when a group involved in a cyber espionage campaign […]

Pierluigi Paganini April 13, 2015
A global operation took down the Simda botnet

Law enforcement dismantled the Simda botnet in an international joint effort that involved also most important private security firms. Another joint operation conducted by law enforcement worldwide and private firms has dismantled the Simda botnet, investigators seized 14 Command and control servers, ten of which located in the Netherlands. Other C&C servers were located found […]

Pierluigi Paganini April 11, 2015
A Closer Look at the Dridex Trojan After Some Recently Received E-mails

The security Expert Michael Fratello provide us a closer look at the Dridex Trojan following its investigation on the malicious agent. The Dridex Banking Trojan is a part of a family of Trojans classified as “banking trojans“.  An article describing the Dridex Trojan and some of its inner-workings were published by TrendMicro in November of 2014. […]

Pierluigi Paganini April 10, 2015
Did the attackers hack TV5Monde with the Kjw0rm Remote Access Trojan?

A new hypothesis on the attack that compromised the French TV station TV5Monde: Hackers of the Cyber Caliphate team used the Kjw0rm Remote Access Trojan. The cyber attacks against the French TV5Monde Channel that resulted in the network take over and the hijacking of social media account of the broadcaster is focusing the attention of the media. […]

Pierluigi Paganini April 10, 2015
Operation Buhtrap: New Spyware is targeting Russian Banking Sector

ESET has discovered a new hacking campaign dubbed Operation Buhtrap based on a family of spyware targeting vulnerabilities within the Russian Windows System. Late in 2014 analysts at ESET uncovered CVE-2012-0158, a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library.  This particular malicious code can be activated by a […]

Pierluigi Paganini April 09, 2015
Beebone botnet has been shut down by an international operation

The Beebone botnet has been shut down in a joint operation between U.S. and European law enforcement and a number of private security companies. A new joint operation run by US and European law enforcement and a number of private security firms took down the polymorphic Beebone botnet, also known as AAEH. The operation was […]

Pierluigi Paganini April 09, 2015
AlienSpy RAT exploited to deliver the popular Citadel Trojan

Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]

Pierluigi Paganini April 03, 2015
Eastern European Cyber-gang manages a new Dyre Wolf campaign

Security experts from IBM discovered a very sophisticated malware campaign based on the Dyre Trojan to hack Corporate Bank Accounts. IBM has uncovered an important cyber criminal operation dubbed The Dyre Wolf due to the name of the popular Dyre malware used crooks. The Dyre malware was discovered in the wild by several security firms, […]

Pierluigi Paganini April 03, 2015
Google goes on the Offensive versus Ad Injectors

Google has announced serious actions to prevent ad injectors that compromise the integrity of users’ browsing experience across the globe. Google has declared “war” on programs that compromise the integrity of users’ browsing experience across the globe.  In a recent blog post featured on Google’s Online Security Blog, Google has released information surrounding research that […]

Pierluigi Paganini April 03, 2015
TrendMicro spotted a 64-Bit variant of NewPosThings PoS malware

Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]