Malware

Pierluigi Paganini December 28, 2013
Dexter Malware, the rise of malware that hits point of sales

Security experts at Arbor Networks have found a couple of servers used to arrange a malicious campaign against PoS with Dexter malware. At the end of 2012, Israel based company Seculert  notified about Dexter malware, used for parsing memory dumps of specific POS software related processes, looking for Track 1 / Track 2 credit card data. Dexter […]

Pierluigi Paganini December 26, 2013
Microsoft Security Intelligence Report consecrates Turkey as malware paradise

Microsoft Security Intelligence Report states the malware encounter rate in Turkey is far greater than that of any other country in the entire world. The Microsoft Security Intelligence Report (SIR) is a periodic study of the threat landscape of exploits, vulnerabilities, and malware. It is based on data from Internet services and over 600 million […]

Pierluigi Paganini December 19, 2013
ChewBacca, the last Tor-based banking trojan

Kaspersky Lab experts have discovered a new Tor-based banking trojan named “ChewBacca”, it is the last malware exploiting Tor network. Tor network is a territory of exploration for cybercriminals that are increasing their attention in the popular anonymizing network for make more resilient malicious botnets. The principal advantages for adoption of hidden service in a […]

Pierluigi Paganini December 17, 2013
NSA – A bios malware can remotely destroy any US system

During a CBS Interview show “60 Minutes”, The NSA Director General Alexander and the Information Assurance Director Plunkett  claimed a foreign government has developed a BIOS based malware that can remotely destroy any computer. Senior National Security Agency (NSA) officials have revealed to CBS American television newsmagazine “60 Minutes” that a foreign government has tried […]

Pierluigi Paganini December 16, 2013
Advanced Power hits Firefox Users to conduct vulnerability scanning

KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability scanning. Krebson security blog posted an interesting article on a new concerning botnet infected more than 12,500 systems disguises itself as a legitimate add-on for Mozilla Firefox to hack websites on a large scale.  The botnet, […]

Pierluigi Paganini December 12, 2013
ENISA Threat Landscape 2013 report, the rise of cyber threats

ENISA releases the ENISA Threat Landscape 2013, it a collection of information on top cyber-threats that have been assessed in the reporting period. The European Network and Information Security Agency (ENISA) published the ENISA Threat Landscape 2013 report, a document that was annually issued to analyze significant evolutions in the cyber-threat landscape. The ENISA has […]

Pierluigi Paganini December 11, 2013
Detected 64-bit ZeuS banking trojan using Tor network

Security researchers at Kaspersky Lab have detected a 64-bit Zeus banking trojan version enhanced with communication capability on the Tor network. Is Zeus banking trojan dead? Absolutely no! Periodically security experts found new a variant that includes new features to make it more resilient and able to spread itself via social networks. Last variant was […]

Pierluigi Paganini December 08, 2013
Zero-day vulnerability exploits, too precious commodities

NSS Labs issued the report titled “The Known Unknowns” to explain dynamics behind the market of zero-day exploits. Last week I discussed about the necessity to define a model for “cyber conflict” to qualify the principal issues related to the use of cyber tools and cyber weapons in an Information Warfare context, today I decided […]

Pierluigi Paganini December 07, 2013
Microsoft,Europol,FBI and partners decapitated ZeroAccess botnet

Microsoft Digital Crimes Unit, FBI, Europol and industry partners decapitated the feared ZeroAccess botnet that hijacks search results Microsoft this week has announced that thanks to a joint operation of its Digital Crimes Unit and the Federal Bureau of Investigation (FBI), Europol’s European Cybercrime Centre (EC3) and technology companies has decapitated ZeroAccess botnet.     […]

Pierluigi Paganini December 04, 2013
Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio signals. The shocking news that it is possible to infect a computer with Inaudible Audio signals is circulating within the security community has been circulating for several weeks between denials and confirmations. In October the […]