Malware

Pierluigi Paganini September 30, 2014
A mobile spyware used to track activists in Honk Kong

A Fake Occupy Central app containing a spyware is used by unknown to track activists in Hong Kong. Evidences suggest the involvement of Chinese entities. A Fake Occupy Central app is targeting the smartphones of the activists belonging to the Occupy Central pro-democracy movement with spyware. The malicious app  has circulated online claiming to be an instrument […]

Pierluigi Paganini September 29, 2014
iFrame-based redirection attacks used to monitor Chinese organizations

Security Experts at FireEye discovered a new malicious campaign which is targeting Chinese organizations with iFrame traffic redirection to serve RAT. Security experts at FireEye observed a new malicious campaign that is targeting non-profit organizations and non-governmental organizations by compromising legitimate website. The threat actors use to compromise legitimate websites to host iframes used to hijack visitors […]

Pierluigi Paganini September 25, 2014
AutoIT Malware infected thousands of computers worldwide

A Greek security researcher discovered a strain of malware which is a combination of AutoIT software and a commercial Keylogger named Limitless Keylogger. A few days ago security a database containing 5 million alleged Google login and password has been leaked online on a Russian cyber security internet forum. Google immediately started its investigation and discovered that huge archive […]

Pierluigi Paganini September 24, 2014
Russian BlackEnergy malware targeting European countries

Ongoing cyber espionage campaign based on BlackEnergy malware hit targets in Poland, Ukraine and Belgium. Experts at ESET and F-Secure firms analyzed it. BlackEnergy malware is still in the wild representing a serious threat, a new ‘Lite’ version of the malware has been detected by experts at ESET security firm. BlackEnergy is a popular DDoS Trojan, gained […]

Pierluigi Paganini September 23, 2014
VBA malware on the rise, a threat wrongly underestimated

Security experts at Sophos have detected a surge in cyber attacks based on VBA malware, such threats are still very insidious but often underestimated. Experts at SophosLabs observed a surge in VBA malware, according their analysis macro-based malware accounted for 28 percent of all malware attack detected in July, up from just six percent in June, despite […]

Pierluigi Paganini September 22, 2014
Windseeker spyware app implements advanced injection and hooking techniques

Security experts at Lacoon Mobile Security detected a malicious app dubbed Windseeker which uses rare injection and hooking techniques to spy on users. Windseeker is a malicious Android app which attracted experts at Lacoon Mobile Security, the principal characteristics of the app are its injection and hooking techniques used to spy on mobile users. The techniques are rare […]

Pierluigi Paganini September 19, 2014
Home Depot confirms data theft for 56 million cards

Home Depot announced that data related to 56 million cards were stolen by cyber criminals. Home Depot, the US largest home improvement retailer, confirms breach impacted 56 million customers. On Thursday the company Home Depot released an update on the evolution of the investigation of the data breach suffered by the company. Home Depot data breach is larger than the […]

Pierluigi Paganini September 19, 2014
Schneider ClearSCADA platform affected by different security flaws

ICS-CERT issued a security advisory for the existence of vulnerabilities in a variety of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions. According to a recent advisory issued by the ICS-CERT (ICSA-14-259-01) several Electric’s StruxureWare SCADA Expert ClearSCADA are affected by different vulnerabilities. The independent researcher Aditya Sood has discovered a weak hashing algorithm and CSRF vulnerability in […]

Pierluigi Paganini September 18, 2014
Chinese hackers hit several US contractors

A report issued by the Senate Armed Services Committee reveals alleged Chinese hackers conducted dozens of cyber attacks on US defense contractors. A study conducted by the Senate Armed Services Committee discovered that hackers gained access to the systems run by US defense contractors work for the US Transportation Command (TRANSCOM). The Senate study released […]

Pierluigi Paganini September 17, 2014
WikiLeaks publicly disclosed copies of FinFisher surveillance software

WikiLeaks has published copies of the criticized FinFisher surveillance software, claiming that the malware is sold to the most “abusive” regimes in the world. Copies of the surveillance software “FinFisher” were made available for public scrutiny by WikiLeaks early this week. The international, online journalistic organization has decided to publish the public disclose the criticized software online to allow […]