Malware

Pierluigi Paganini October 14, 2015
FIN5 hacking crew steals 150,000 credit cards from casino

FireEye has uncovered a new hacking group dubbed FIN5 hacked payment systems of an un-named Casino and it has stolen nearly 150,000 credit cards. The fact that the game can create problems is not a novelty, news of the day is that an un-named Casino has lost 150,000 credit cards. The cause of the data […]

Pierluigi Paganini October 14, 2015
Espionage campaign relying on the Zeus Trojan targets the Israeli Public Sector

Check Point discovered a series of malware-based attacks on Israeli public sector organizations that were infected by the Zeus Trojan via RTF files. Security experts at Check Point have detected a series of attacks on high-profile companies, victims were targeted by a malicious spam campaign that relies on bogus RTF file. The campaign targeted several individuals […]

Pierluigi Paganini October 13, 2015
Malware-based attack targets America’s Thrift Stores

America’s Thrift Stores announced on Friday that payment information of a part of its customers might have been stolen by hackers which used a PoS malware. America’s Thrift Stores has announced in an official statement that it has suffered a malware-based attack that caused a data breach. According to the company, the threat actors are […]

Pierluigi Paganini October 13, 2015
The rise of the Japanese Cybercrime Underground

Researchers at Trend Micro have issued a new report on the Japanese Cybercrime Underground, a growing criminal community with his characteristics. Cybercrime underground is a growing and prolific industry that knows no crisis as demonstrated by the numerous reports issued by principal security companies and law enforcement. In the past we have analyzed criminal most […]

Pierluigi Paganini October 13, 2015
NSA SHARKSEER program aims to detect and mitigate malware Zero-Day

The NSA SHARKSEER Program is a project that aims to detect and mitigate web-based malware Zero-Day and Advanced Persistent Threats using COTS technology. Every day, thousands of cyber attack rely on exploitation of zero-day exploits, even more sophisticated ATP groups trigger unknown vulnerabilities to compromise systems across the world. Intelligence agencies and research groups are investing […]

Pierluigi Paganini October 11, 2015
The Dark web – Why the hidden part of the web is even more dangerous?

Cyber Threat Summit 2015 – Study on criminal activities in the dark web.  “The Dark web – Why the hidden part of the web is even more dangerous?” Also, this year I have participated as a speaker to the Cyber Threat Summit 2015 held in Dublid, an event aimed at senior CISO level delegates and senior executives […]

Pierluigi Paganini October 09, 2015
Code Signing certificates becoming popular cybercrime commodity

Learn what Certificates as a Service stand for, discover why Code Signing certificates are a precious commodity and find out how to protect yourself online. A recent phenomenon tracked by IBM Security X-Force researchers is the CaaS (Certificates as a service). Cybercriminals would use the Dark Web for selling high-grade code certificates -which they have […]

Pierluigi Paganini October 09, 2015
Kemoge – Malicious Android Adware Infects Devices worldwide

Researchers at FireEye spotted a new malicious adware campaign (Kemoge threat) that has infected Android mobile devices in more than 20 countries. Security researchers at Fireeye have uncovered a malicious adware campaign which relies on a threat dubbed “Kemoge” based on the name of its command and control (C&C) domain aps.kemoge.net. The Kemoge malware is packaged with various popular […]

Pierluigi Paganini October 07, 2015
The Angler Exploit Kit Exposed: Making $60 Million Annually by Delivering Ransomware

The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had behind-the-scenes access. The Cisco Talos Group has performed in-depth research on the threat actors behind the Angler Exploit Kit, and even had behind-the-scenes access, allowing statistical information as well as Angler’s inner-workings to be examined. Note that […]

Pierluigi Paganini October 06, 2015
Attackers hack into Outlook Web App (OWA) Server for access to organization network

Researchers have discovered an advanced malware that can breach organizations by infecting their Outlook Web Application (OWA) mail server. According to the experts at the Cybereason security firm threat actors breached an unnamed organization network and maintained persistence for months via a webmail server. The victim was a midsize public services company based in the […]