The drop in the value of the Bitcoin is pushing cyber criminals to rapidly cash-out their ears with ransomware in order to monetize their efforts. The business made by exploiting Ransomware has seen better days, all because the value of Bitcoin is dropping, that means, to avoid losing more money crooks are laundering money. “They( criminals) […]
Security experts at Trend Micro have discovered Phasebot malware, which also has fileless infection as part of its routine, is being sold online. Phasebot is a strain of malware characterized by fileless infection that is being sold in the criminal underground. In August 2014, experts at GData discovered Poweliks, a persistent malware able to infect machines without installing […]
Pushdo botnet continues to infect a large number of users worldwide, mainly in India, Indonesia, Turkey and Vietnam. Security experts at the Fidelis Cybersecurity firm have discovered a new variant of the Pushdo spamming botnet, which infected machines in more than 50 countries worldwide. The botnet is able to send out around 7.7 billion spam […]
During a recent investigation the experts at Trustwave encountered a new strain of POS malware dubbed Punkey which presents interesting features. Malware researchers at Trustwave have detected a new point of sale (PoS) malware dubbed Punkey that was used by criminal crews to compromise payment systems of some organisations. The experts discovered Punkey during a law […]
The victims of CoinVault ransomware can now decrypt the files encrypted by the malicious code by using a free removal tool released by Kaspersky firm. There is good news for you, dear reader, if you are facing this problem with CoinVault Ransomware, Kaspersky just found the solution to end your problems. Now it’s possible to […]
The elite cyber crime group Hellsing strikes back after attack by the rival APT crew known as Naikon. This is the first documented case of APT-on-APT attack. What happens when an APT group running a cyber espionage campaign target a second distinct APT group? The events occurred last year, when a group involved in a cyber espionage campaign […]
Law enforcement dismantled the Simda botnet in an international joint effort that involved also most important private security firms. Another joint operation conducted by law enforcement worldwide and private firms has dismantled the Simda botnet, investigators seized 14 Command and control servers, ten of which located in the Netherlands. Other C&C servers were located found […]
The security Expert Michael Fratello provide us a closer look at the Dridex Trojan following its investigation on the malicious agent. The Dridex Banking Trojan is a part of a family of Trojans classified as “banking trojans“. An article describing the Dridex Trojan and some of its inner-workings were published by TrendMicro in November of 2014. […]
A new hypothesis on the attack that compromised the French TV station TV5Monde: Hackers of the Cyber Caliphate team used the Kjw0rm Remote Access Trojan. The cyber attacks against the French TV5Monde Channel that resulted in the network take over and the hijacking of social media account of the broadcaster is focusing the attention of the media. […]
ESET has discovered a new hacking campaign dubbed Operation Buhtrap based on a family of spyware targeting vulnerabilities within the Russian Windows System. Late in 2014 analysts at ESET uncovered CVE-2012-0158, a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library. This particular malicious code can be activated by a […]