Malware

Pierluigi Paganini May 25, 2015
Why Carbanak C&C points to Russia Federal Security Service?

A security researcher at Trend Micro discovered that the malware used by the Carbanak cybergang is using a C&C server linked to the Russian FSB. Maxim Goncharov, security expert at Trend Micro, revealed that one of the most sophisticated malware used by the popular gang Carbanak is now pointing to Russia’s Federal Security Service (FSB). The […]

Pierluigi Paganini May 25, 2015
Fake Android Minecraft apps scammed million users

Experts at ESET have discovered over 30 scareware uploaded to the Google Play store over nine months masquerading as Minecraft cheats and tip guides. Do you completely trust mobile applications available on the official app store like Google Play? If your answer is yes, you’re wrong. ESET security researcher Lukas Stefanko has discovered 30 malicious apps uploaded […]

Pierluigi Paganini May 24, 2015
The Phantom Menace, who targeted the oil tankers?

Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. According to Panda Security the attacks on oil cargos began in August […]

Pierluigi Paganini May 22, 2015
Criminals are using SVG Files to serve malware

Security experts at AppRiver firm have discovered a malicious campaign that is distributing a strain of ransomware via SVG files. Researchers at the AppRiver security firm have uncovered a malicious campaign that is distributing a strain of ransomware by exploiting SVG files. The SVG (Scalable Vector Graphics) is an XML-based vector image format for two-dimensional graphics […]

Pierluigi Paganini May 22, 2015
Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware infections. CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are […]

Pierluigi Paganini May 21, 2015
Malicious version of PuTTY is spreading in the wild

Bad actors have released a malicious version of the popular open source tool PuTTY to steal access credentials of computers worldwide. Be careful, there is an unofficial version of Putty in the wild and it seals information. This version was compiled from the legitimate source, but isn’t hosted on the official website project, instead, attackers redirect […]

Pierluigi Paganini May 19, 2015
Rombertik destroys the MBR to prevent unauthorized use of the malware

According to the experts at Symantec, the Rombertik malware attempts to destroy the MBR to prevent unauthorized use of the Trojan. Early this month, the experts at Cisco have published a report on the Rombertik, a high sophisticated strain of malware that wipes hard drive to prevent analysis. According to Symantec, Rombertik is a new […]

Pierluigi Paganini May 16, 2015
mSpy data breach exposes thousand kids to online predators

Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand of kids are at risk. Last week, e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web. mSpy, is a software-as-a-service product that officially was designed to […]

Pierluigi Paganini May 11, 2015
Mac PCs are unprotected against malware

Patrick Wardle is a former NSA staffer that turned to a security researcher, the expert explained that his main concern is that MAC OS X security tools in the market are trivial and easy to bypass. One of the most known applications in Macs its Gatekeeper, but Patrick says that Gatekeeper can be easily misguided […]

Pierluigi Paganini May 10, 2015
Security Affairs newsletter Round 8 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Trustwave discovered the first political malvertising campaign Mozilla Fundation, a step toward to full HTTPS implementation How Selerity reported Twitter’s earnings—before Twitter did Carders crack Hard Rock casino Australian […]