Malware

Pierluigi Paganini April 03, 2014
F-Secure has discovered MiniDuke malware samples in the wild

Security Experts at F-Secure discovered a collection of pdf documents, that had references to Ukraine, containing MiniDuke malware samples. MiniDuke is the name of a sophisticated cyber espionage campaign discovered more than one year ago by experts at Kaspersky Lab and Hungary’s Laboratory of Cryptography and System Security (CrySyS). The malicious code was used by unknown hackers to […]

Pierluigi Paganini April 02, 2014
How Coremex malware monetizes search engine Hijacking

F-Secure has identified a malware dubbed Coremex that takes advantage of plugin functionality provided by browsers to hijack search engine results. Search engine are a strategic component in the successful execution of any attacks, we saw in the past Black SEO campaigns conducted with the primary intent to provide results that help the attackers to […]

Pierluigi Paganini April 01, 2014
WinRAR zero-day exploited in cyber espionage campaign

Israeli researcher Danor Cohen has discovered a security flaw in WinRAR, IntelCrawler confirmed was exploited in cyber espionage campaign. WinRAR is a popular shareware file archiver and data compression utility, as usual these applications are targeted by hackers because their penetration level. Recently the Israeli researcher Danor Cohen has discovered that a security flaw in WinRAR is being exploited in a series […]

Pierluigi Paganini April 01, 2014
Chinese CCTV reported cases of pre-installed malware on Android mobile

Chinese TV station, CCTV, has reported some cases where smartphone were compromised by pre-installed malware before selling them on to unwitting customers. What’s about to pay a mobile phone with Malware pre-installed? Of course the malware is free! It is not a joke, Chinese TV station CCTV, during a show for the World Consumer Rights Day […]

Pierluigi Paganini March 30, 2014
Coinkrypt Android malware used to mine digital currencies

Experts at Lookout Mobile Security have discovered that cyber criminals are spreading Coinkrypt malware to use victim’s mobile to mine digital currencies. Security experts at Lookout Mobile Security firm have discovered that cyber criminals are adopting Coinkrypt malware to use victim’s mobile phone to mine digital currencies. In many cases we discussed of the raise for criminal activities that […]

Pierluigi Paganini March 29, 2014
Reading the Global Threat Intelligence Report (GTIR)

The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013. The NTT Innovation Institute has released the new Global Threat Intelligence Report (GTIR), a document structured to raise awareness of the rapidly evolving global threat landscape. The GTIR was based on threat intelligence and attack data from […]

Pierluigi Paganini March 27, 2014
Gameover ZeuS is Targeting recruitment websites

Security experts at F-Secure have detected a new variant of Gameover ZeuS financial Trojan which is targeting recruitment websites. Zeus Trojan is probably one of the most prolific and long-lived malware, security firms have discovered in the last years numerous variant even more sophisticated. After the public release of it source code, principal security firms have […]

Pierluigi Paganini March 27, 2014
FireEye uncovered APTs exploiting interest on Malaysian Flight MH370

Security experts at FireEye uncovered a cyber espionage campaign based on multiple MH370 themed spear phishing emails. Security researchers at FireEye have revealed a link between a recent spear phishing campaign on Malaysian Airlines flight MH370 and the attacks conducted by some advanced persistent threat (APT) attackers. The mysterious skyjacking of the Boeing 777-200 aircraft of Malaysian Airlines, flight MH370, is considered one of the events […]

Pierluigi Paganini March 22, 2014
New variant of Zorenium Bot can infect iOS devices

Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to infect also iOS devices. Security analysts at SenceCy are monitoring the evolution for the Zorenium Bot, a new and unknown malware which has been advertised in the underground since January 2014. This is the third […]

Pierluigi Paganini March 20, 2014
Tor browser app in the Apple app store is fake

For more than two months is is present in the official App Store a fake version of the Tor Browser app. It’s full of adware and spyware. The Tor Browser is the most popular tool for anonymization of the user’s Internet experience, it’s use is literally exploded after the  disclosure of numerous documents leaked by […]