Malware

Pierluigi Paganini November 25, 2014
Regin backdoor used to compromise the GSM Networks

Security experts at Kaspersky Lab issued a detailed paper on the analysis of the backdoor Regin focusing on the attacker’s activity against the GSM networks. The day after the disclosure of the Regin Backdoor by Symantec, which provided the details the new sophisticated cyber espionage tool,the principal security firms published the results of their investigation. As […]

Pierluigi Paganini November 24, 2014
How hackers are exploiting vulnerable DVRs to conduct illegal activities

Security experts discovered a new malware that targets DVR and other Internet of Things devices recruiting them for different illegal activities. DVR, abbreviation for Digital Video Recorders systems, from Hikvision firm are affected by vulnerabilities that allow an attacker to hack them remotely. Digital Video Recorders are systems used to record surveillance footage of office buildings and […]

Pierluigi Paganini November 24, 2014
Regin – Highly advanced spying tool discovered by Symantec

Symantec has uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators. Backdoor Regin, is the name assigned by the experts at Symantec to an advanced spying tool that has been used in cyber espionage campaigns against governments, infrastructure operators, private companies, researchers, and private individuals. Regin appears […]

Pierluigi Paganini November 23, 2014
Electronic cigarettes exploited in the wild to serve malware

In a discussion started on the Reddit news media website it has been debated the case of a malware implanted by using electronic cigarettes connected over USB. Hackers are able to exploit any electronic device to serve a malware of to compromise a poorly protected network, electronic cigarettes have become the latest vector to serve spread […]

Pierluigi Paganini November 19, 2014
The US energy industry is constantly under cyber attacks

Data related to the number of incidents occurred to national infrastructure confirms that the US Government energy industry is constantly under attack. The US Government is aware that nation’s energy grid is constantly under attack by state-sponsored hackers and cyber criminals. Recently The Department of Homeland Security (DHS) revealed that Russian hackers have infiltrated several critical […]

Pierluigi Paganini November 16, 2014
OnionDuke: APT Attacks exploited the Tor Network

Experts at F-Secure discovered a link between the crew operating a rogue Tor node used to spread OnionDuke malware and MiniDuke APT. A few weeks ago the security research Josh Pitts of Leviathan Security Group identified a Russian Tor exit node that is patching the binaries downloaded by the users with malware. The researcher informed officials […]

Pierluigi Paganini November 16, 2014
A new BASHLITE variant infects devices running BusyBox

A new variant of the BASHLITE malware exploiting the ShellShock vulnerability was used by cyber criminals to infect devices that use BusyBox software. A new strain of the BASHLITE malware was detected by experts at Trend Micro shortly after the public disclosure of the ShellShock bug. The malware, named ELF_BASHLITE.A (ELF_FLOODER.W), includes the payload of the ShellShock exploit […]

Pierluigi Paganini November 13, 2014
The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable from underground. Cybercriminals ordinary use malicious code to steal money from victims, the number of malware available in the criminal ecosystem is continuously growing, their level of sophistication and cost are extremely variable. Thinking of banking […]

Pierluigi Paganini November 09, 2014
WireLurker malware is threatening Apple mobile devices

Security Experts at Palo Alto Networks have discovered a new variant of malware dubbed WireLurker that is infecting Apple mobile devices. A new strain of malware dubbed WireLurker  is threatening Apple users, the malicious code is able to infect Apple iPhone and iPad syphoning user’data. The malware was discovered for the first time by experts […]

Pierluigi Paganini November 06, 2014
ROM is the new improved strain of the Backoff PoS Malware

Security experts at Fortinet detected a new variant of Backoff malicious code dubbed ROM, which is an improved version of the popular POS malware. A new strain of the Backoff point of sale malware has been detected in the wild by security experts at Fortinet, the new variant dubbed ROM (W32/Backoff.B!tr.spy) appears more fine-tuned. Like Backoff, ROM […]