Malware

Pierluigi Paganini March 01, 2016
New HackingTeam OS X RCS spyware in the wild, who is behind the threat?

A new OS X sample of the Hacking Team RCS has been detected in the wild, who is managing it? Is the HackingTeam back? A group of malware researchers has discovered a new strain of Mac malware undetected my most security firm, but more  intriguing is the speculation that the malicious code may have been […]

Pierluigi Paganini February 29, 2016
The new FighterPOS PoS Malware implements worm capabilities

The threat actors behind the FighterPOS PoS malware have added worm capabilities to their malicious code that is now targeting systems in the United States. PoS malware represents a serious threat to several industries, from retail to the hotel industry. During the last twelve months, security experts have discovered a significant number of payment card frauds involving […]

Pierluigi Paganini February 28, 2016
German authorities approve the use of home-made Federal Trojan

The German Interior Ministry has approved the use of a federal Trojan developed by the German Federal Criminal Police. The German Interior Ministry has approved the use a spyware developed by the German Federal Criminal Police, aka the ‘federal Trojan’ or Bundestrojaner, for the investigative purpose. “Soon the state could re-enter the computer of suspicious […]

Pierluigi Paganini February 27, 2016
Ransomware attacks paralyzed at least two German hospitals

New ransomware infections hit Germany hospitals, at least two structures were infected by the dreaded malware. New ransomware infections hit hospitals in Germany, at least two of them were infected by the dreaded malware. According to local reports, the systems at two German hospitals were infected by a ransomware, in a similar way occurred recently at the US Hollywood […]

Pierluigi Paganini February 25, 2016
Author of the Angler EK integrated recently Silverlight exploit

The security researcher Kafeine confirmed that the authors of the Angler EK have integrated the exploit for a recently patched Microsoft Silverlight vulnerability. Ransomware is becoming one of the most dreaded cyber threats for netizens, security experts noticed a surge in the number of cyber attacks aimed to spread malware like Cryptowall and TeslaCrypt. Exploit kits like the Nuclear EK […]

Pierluigi Paganini February 23, 2016
Ratopak Trojan – Russian banks under attack

Financially-motivated actors have targeted employees of at least six Russian banks into installing the Ratopak Trojan, experts have found evidence of an extended hacking campaign. According to the Symantec security firm, a cyber criminal gang financially -motivated has targeted employees of Russian banks. The threat actors have been using a Trojan called Ratopak to gain control over the […]

Pierluigi Paganini February 22, 2016
Admedia attacks now rely also on Joomla to serve ransomware

Operators running websites based on the WordPress and Joomla must be aware of a spike in the number of compromised platforms used in Admedia attacks. Not only WordPress CMS, threat actors behind the “Admedia attacks” are now looking with increasing interest to Joomla. This is the discovery made by the experts at the Internet Storm […]

Pierluigi Paganini February 22, 2016
Source code of the Android GM Bot malware was leaked online

The experts at the IBM X-Force threat intelligence have discovered that the source code for Android malware GM Bot was leaked online. Bad news for the Android community, the experts at IBM X-Force threat intelligence have discovered that the source code for Android malware GM Bot was leaked on an underground. The source code was […]

Pierluigi Paganini February 20, 2016
Malicious spam campaign capitalizes the global interest in the Zika virus

The cybercrime ecosystem is getting ready to exploit the media attention on the Zika virus infections for illegal activities. Be careful! What is the relationship between the Zika virus and a malware? It’s just a matter of opportunity, the cyber crime ecosystem is getting ready to exploit the media attention on current issues for illegal […]

Pierluigi Paganini February 20, 2016
Locky Ransomware uses AES to encrypt Local Files and Unmapped Network Shares

Security researchers discovered a strain of ransomware called Locky that uses AES encryption to encrypt local files and files on network shares. Security researchers have discovered a new piece of ransomware called Locky, which uses AES encryption algorithm to encrypt both local files and files on network shares, even if they are unmapped. Security experts […]