Malware

Pierluigi Paganini April 09, 2014
Symantec Internet Security Threat Report on evolution of cyber menaces

Symantec has issued The Internet Security Threat Report, a document which provides an overview and analysis of global threat evolution in 2013. Security experts are observing a significant increase in the number of targeted cyber-attacks, it has been estimated that the growth is by 91 per cent in 2013 respect previous year, but most concerning […]

Pierluigi Paganini April 07, 2014
New Zeus trojan variant digitally signed in the wild

Security researchers at Comodo have detected a new Zeus trojan variant enhanced with digital signature of its source code to avoid detection. The security community is once again menaced by Zeus banking trojan, a new variant of the malicious  ZeuS Trojan has been identified by researchers at Comodo AV labs. This instance presents an interesting feature, it is […]

Pierluigi Paganini April 04, 2014
Android Oldboot B, the most dangerous and complex bootkit of ever

Chinese researchers from “360 Mobile Security” detected Android Oldboot.B malware, until today the most complex bootkit which infected millions of devices. A new sophisticated Android Bootkit has been detected by Chinese Security Researchers from “360 Mobile Security“, its name is Oldboot.B and appears as an evolution of its predecessor Oldboot.A. According the researchers Oldboot.B could be considerable as […]

Pierluigi Paganini April 03, 2014
Security threat landscape in the Middle East … the mined cyber area

Analysis of the cyber threat landscape in the Middle East region provided by Tim Rains, director of Trustworthy Computing at Microsoft, at RSA 2014. Middle East is historically a critical area for the diplomacy, but there is the same critical under the cyber security profile. The governments, the enterprises and the organizations present in the […]

Pierluigi Paganini April 03, 2014
F-Secure has discovered MiniDuke malware samples in the wild

Security Experts at F-Secure discovered a collection of pdf documents, that had references to Ukraine, containing MiniDuke malware samples. MiniDuke is the name of a sophisticated cyber espionage campaign discovered more than one year ago by experts at Kaspersky Lab and Hungary’s Laboratory of Cryptography and System Security (CrySyS). The malicious code was used by unknown hackers to […]

Pierluigi Paganini April 02, 2014
How Coremex malware monetizes search engine Hijacking

F-Secure has identified a malware dubbed Coremex that takes advantage of plugin functionality provided by browsers to hijack search engine results. Search engine are a strategic component in the successful execution of any attacks, we saw in the past Black SEO campaigns conducted with the primary intent to provide results that help the attackers to […]

Pierluigi Paganini April 01, 2014
WinRAR zero-day exploited in cyber espionage campaign

Israeli researcher Danor Cohen has discovered a security flaw in WinRAR, IntelCrawler confirmed was exploited in cyber espionage campaign. WinRAR is a popular shareware file archiver and data compression utility, as usual these applications are targeted by hackers because their penetration level. Recently the Israeli researcher Danor Cohen has discovered that a security flaw in WinRAR is being exploited in a series […]

Pierluigi Paganini April 01, 2014
Chinese CCTV reported cases of pre-installed malware on Android mobile

Chinese TV station, CCTV, has reported some cases where smartphone were compromised by pre-installed malware before selling them on to unwitting customers. What’s about to pay a mobile phone with Malware pre-installed? Of course the malware is free! It is not a joke, Chinese TV station CCTV, during a show for the World Consumer Rights Day […]

Pierluigi Paganini March 30, 2014
Coinkrypt Android malware used to mine digital currencies

Experts at Lookout Mobile Security have discovered that cyber criminals are spreading Coinkrypt malware to use victim’s mobile to mine digital currencies. Security experts at Lookout Mobile Security firm have discovered that cyber criminals are adopting Coinkrypt malware to use victim’s mobile phone to mine digital currencies. In many cases we discussed of the raise for criminal activities that […]

Pierluigi Paganini March 29, 2014
Reading the Global Threat Intelligence Report (GTIR)

The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013. The NTT Innovation Institute has released the new Global Threat Intelligence Report (GTIR), a document structured to raise awareness of the rapidly evolving global threat landscape. The GTIR was based on threat intelligence and attack data from […]