Malware

Pierluigi Paganini May 24, 2015
The Phantom Menace, who targeted the oil tankers?

Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. According to Panda Security the attacks on oil cargos began in August […]

Pierluigi Paganini May 22, 2015
Criminals are using SVG Files to serve malware

Security experts at AppRiver firm have discovered a malicious campaign that is distributing a strain of ransomware via SVG files. Researchers at the AppRiver security firm have uncovered a malicious campaign that is distributing a strain of ransomware by exploiting SVG files. The SVG (Scalable Vector Graphics) is an XML-based vector image format for two-dimensional graphics […]

Pierluigi Paganini May 22, 2015
Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware infections. CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are […]

Pierluigi Paganini May 21, 2015
Malicious version of PuTTY is spreading in the wild

Bad actors have released a malicious version of the popular open source tool PuTTY to steal access credentials of computers worldwide. Be careful, there is an unofficial version of Putty in the wild and it seals information. This version was compiled from the legitimate source, but isn’t hosted on the official website project, instead, attackers redirect […]

Pierluigi Paganini May 19, 2015
Rombertik destroys the MBR to prevent unauthorized use of the malware

According to the experts at Symantec, the Rombertik malware attempts to destroy the MBR to prevent unauthorized use of the Trojan. Early this month, the experts at Cisco have published a report on the Rombertik, a high sophisticated strain of malware that wipes hard drive to prevent analysis. According to Symantec, Rombertik is a new […]

Pierluigi Paganini May 16, 2015
mSpy data breach exposes thousand kids to online predators

Recently e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web, thousand of kids are at risk. Last week, e-mails, text messages, payments, locations, and other data related with mSpy users were posted on the Deep Web. mSpy, is a software-as-a-service product that officially was designed to […]

Pierluigi Paganini May 11, 2015
Mac PCs are unprotected against malware

Patrick Wardle is a former NSA staffer that turned to a security researcher, the expert explained that his main concern is that MAC OS X security tools in the market are trivial and easy to bypass. One of the most known applications in Macs its Gatekeeper, but Patrick says that Gatekeeper can be easily misguided […]

Pierluigi Paganini May 10, 2015
Security Affairs newsletter Round 8 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Trustwave discovered the first political malvertising campaign Mozilla Fundation, a step toward to full HTTPS implementation How Selerity reported Twitter’s earnings—before Twitter did Carders crack Hard Rock casino Australian […]

Pierluigi Paganini May 08, 2015
GPU-based malware, the evolution of rootkits and keyloggers

Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently developers have published two strains of malware, Jellyfish rootkit and the Demon keylogger, that implement an unusual way to run on a victim’s […]

Pierluigi Paganini May 07, 2015
New AlphaCrypt ransomware, the new threat in the criminal underground

AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is delivered via Angler Exploit kit. Ransomware is among most popular malware families in the criminal underground, recently security firms have discovered numerous variant targeting desktop and mobile platforms. Recently a new strain of ransomware dubbed […]