Malware

Pierluigi Paganini September 13, 2014
A Brazilian newspaper site used in server malware to change Router DNS Settings

A Brazilian newspaper’s website has been hacked to serve a malware that tries to change the victim’s router DNS settings brute forcing the admin panel. A Brazilian political newspaper’s website has been compromised with malware that tries to change the victim’s router DNS settings. The security firm Securi has published a blog post on a […]

Pierluigi Paganini September 12, 2014
Malicious Chrome Extensions in official Store serve infected links on Facebook

Security experts at TrendMicro have uncovered a new malicious campaign based on a Chrome extension deployed on the official Chrome Store. A few months ago I wrote an article on the presence of a malicious Chrome browser extension, dubbed Cryptsy Dogecoin (DOGE) Live Ticker, available on the official store that was able to steal digital coins. […]

Pierluigi Paganini September 11, 2014
Dyre Zeus variant malware used for corporate espionage

Security experts warn Dyre malware is being used by cyber criminals for corporate espionage instead harvest banking credentials. Dyre is the name of a new variant of the immortal Zeus banking trojan worries cyber security experts, this new strain doesn’t limit its stealing activity to user’s banking credentials, but search for customer information. Dyre has been detected […]

Pierluigi Paganini September 09, 2014
Clearsky detected Gholee malware – The Israel-Gaza Conflict Takes to the Cyber-Arena

Experts at Clearsky detected the Gholee virus which was likely developed by highly qualified factors, which may even be related to Israel’s long-time nemesis Iran. Experts from Clearsky, an Israeli cyber-security company, detected an “operation protective edge” themed spear phishing attack, carried out via emails containing a malicious excel file. Once opened and its VBA […]

Pierluigi Paganini September 09, 2014
Trustwave analyzed of point-of-sale malware

Experts at Trustwave analyzed point-of-sale malware providing data related principal code used, exfiltration and persistence techniques implemented. Trustwave firm as published an interesting report on the point-of-sale malware based on its investigation on different breaches involving payment card data. The experts at Trustwave have examined a large amount of malware that targets point-of-sale devices, this family of malicious code is […]

Pierluigi Paganini September 07, 2014
TrendMicro detected a malware bypasses Chrome Extension Security Feature

Experts at TrendMicro detected a new click fraud campaign based on a malware able to bypass the Chrome Extension Security Feature. A group of researchers has discovered that malicious code can easily bypass Chrome Extension Security Feature, the team has found a new social engineering trick that leads users to a malicious extension from Google Chrome […]

Pierluigi Paganini September 06, 2014
APT ported XSLCmd Backdoor on OS X according to FireEye

Security Experts at FireEye Lab discovered a new variant of the XSLCmd backdoor that has been used in targeted attacks infecting Mac OX based systems. Experts at FireEye Labs have discovered a previously unknown variant of the APT backdoor XSLCmd, OSX.XSLCmd, which is used by a group of hackers known for past cyber espionage activities against the U.S. […]

Pierluigi Paganini September 04, 2014
AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several industries. Security experts at AlienVault Labs have uncovered a watering hole attack with a singular characteristic, the attackers are using a framework developed for reconnaissance as the primary infection vector. The attackers deployed a malicious JavaScript on the targeted […]

Pierluigi Paganini September 01, 2014
The case of Linux DDoS Trojan ported to Windows

Experts at Dr.Web detected a Linux DDoS Trojan designed to infect also Windows OS, the circumstance is considered rare in the criminal ecosystem. The Russian antivirus company Dr. Web discovered that a Chinese DDoS Trojan written for Linux operating system seems have jumped to Windows, an event considered rare. “Cases of Linux malware being tailored by […]

Pierluigi Paganini September 01, 2014
APWG Q2 2014 report, phishing is even more dangerous

The APWG Report Q2 2014 states that phishing activities continue to increase, phishers are targeting Crypto Currency, Payment Services and Retail Sites. The APWG has published its new report related to phishing activities in the period April – June 2014, the document titled “Phishing Activity Trends Report, 2nd Quarter 2014” states that online payment services […]