Malware

Pierluigi Paganini November 22, 2016
Ask.com infected toolbar gets stopped in its tracks before it gets started

Security experts at Red Canary discovered attackers who were trying to use the Ask.com Toolbar as a vector to spread malware. A just-in-time catch by sharp-eyed analysts at Red Canary has thwarted what looks like early stage development and deployment of malicious software delivered via Ask.com’s toolbar. The PE (Portable Executeable) delivered by Ask.com, which […]

Pierluigi Paganini November 21, 2016
Watch out, Locky ransomware spread via SVG images on Facebook Messenger

Researchers have discovered a new hacking campaign leveraging on Facebook Messenger to spread the Locky ransomware via SVG images. The Locky Ransomware is spread via a downloader, experts noticed that it is able to bypass Facebook defense measures by pretending to be a harmless  image file. The campaign was first spotted during the weekend by the malware […]

Pierluigi Paganini November 21, 2016
An Android Spyware revealed the existence of a new Italian surveillance firm

A strain of Android spyware recently analyzed by security experts from RedNaga Security team points to an another Italian company. A new strain of Android malware reveals the existence of a new Italian player in the surveillance landscape. The Android spyware was analyzed by researchers from the RedNaga Security team, that is a first time […]

Pierluigi Paganini November 19, 2016
How the Mirai botnet hacks a security camera in a few seconds

The popular security expert Robert Graham, CEO of Errata Security, has explained how the Mirai botnet could hack a security camera in a few seconds. The recent string of attacks powered with the Mirai botnet has demonstrated to the security industry the potential effects of DDoS attacks on the global Internet backbone. Experts who investigated […]

Pierluigi Paganini November 18, 2016
Mirai botnet leverages STOMP Protocol to power DDoS attacks

Cyber criminals are exploiting the capability of the Mirai botnet to use the STOMP Protocol to launch massive DDoS attacks. The Linux Mirai IoT malware is one of the most popular cyber threats in the moment, its botnet was used to power the massive attacks against the Dyn DNS service, OVH, Brian Krebs’ blog, and likely […]

Pierluigi Paganini November 17, 2016
CryptoLuck Ransomware spread through the RIG-E Exploit Kit

CryptoLuck ransomware is a new strain of malware discovered by the researcher Kafeine, that is being distributed via the RIG-E exploit kit. The notorious researcher Kafeine has spotted a new strain of ransomware dubbed CryptoLuck. The malware leverages DLL hijacking and exploits the legitimate GoogleUpdate.exe executable to infect computers. The ransomware appends the .[victim_id]_luck extension to the encrypted […]

Pierluigi Paganini November 15, 2016
Ransomware: How to recover your encrypted files, the last guide.

In this guide, we will explain how to recover encrypted files focusing on the Data-Locker Ransomware that targets the Windows operating system. Why my system asks me to pay? A ransomware is a computer malware that limits the access of a system and ask for a ransom in order to remove that restriction. The restriction […]

Pierluigi Paganini November 15, 2016
CrySis ransomware decryption keys published online

The decryption keys for the CrySis ransomware were posted online on the BleepingComputer.com forum by a user known as crss7777. Good news for the victims of the CrySis ransomware, on Sunday the master decryption keys were released to the public. Security experts from Kaspersky Lab have already included the decryption keys in the Rakhni decryptor allowing victims […]

Pierluigi Paganini November 11, 2016
Telecrypt ransomware abuses Telegram Messenger’s communication protocol

Telecrypt ransomware is a new malware that abuses the instant messaging service Telegram for command and control (C&C) communications. Security experts from Kaspersky Lab have spotted a new Ransomware, called Telecrypt (Trojan-Ransom.Win32.Telecrypt), that abuses the Telegram instant messaging service for communications with command and control (C&C). The Delphi-written Trojan, which is currently targeting only Russian users, it exploits […]

Pierluigi Paganini November 10, 2016
MalwareMustDie is closed for protest against the NSA

The Legendary Blog of MalwareMustDie is closed for protest against NSA hacking trace of educational and public servers of harmless countries. The Shadow Brokers, the hacker group that hacked NSA hackers, who have previously released NSA hacking tools for anyone to download, published more files containing the IP address of 49 countries that have been […]