Malware

Pierluigi Paganini February 23, 2013
What does the Poetry with Citadel trojan?

Recently I published an article on the attacks against Japanese banks using a new variant of the popular Zeus, one of the most prolific malware of recent history, security experts in fact have detected various versions of the popular malicious code that hit also mobile and social networking platforms. Due its flexibility the malware has […]

Pierluigi Paganini February 19, 2013
Apple hacked … lengthens the list of illustrious victims

There is no peace for enterprises, in few weaks we have discovered how much vulnerable are giants of IT, one after another, fell the most renowned names from Facebook to Twitter, companies that we considered immune from thousands of attacks they receive each day. Until now Microsoft and Apple weren’t affected … but it’s news […]

Pierluigi Paganini February 18, 2013
Government networks totally vulnerable to cyber attacks

In this days it is circulating persistently the news that The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced by House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) before the US House next week. The controversial cyber bill raised an heated debate, the act will force any company to […]

Pierluigi Paganini February 17, 2013
Zeus hit five major banks in Japan

Zeus malware is considered the most popular and prolific malicious code for banking, it is one of the privilege agent by cybercrime the use to sell various customized version in the underground to conduct sophisticated frauds. Security community has found it in different occasion and anyway it was a surprice, the malware has evolved in […]

Pierluigi Paganini February 14, 2013
Botnets for rent, criminal services sold in the underground market

Internet is becoming a mine for criminals that in easy way are able to access to any kind of resources to arrange a cyber attacks, a cyber espionage campaign or a complex banking fraud. What is very scaring is the simplicity with which it is possible to acquire any kind of criminal services in the underground […]

Pierluigi Paganini February 11, 2013
PandaLabs has published the annual report 2012

Security Software Company PandaLabs has published the annual report on cyber threats proposing interesting statistics on the diffusion of malicious agent on personal computers during 2012. Malware diffusion has registered new records, the security firm detected 27 million new malicious codes, around 74,000 new samples per day, the attacks have targeted government offices and multinational […]

Pierluigi Paganini February 10, 2013
Bit9 hacked, stolen digital certificates to sign malware

The week ended in the worst way for the security company Bit9 that last Friday announced that hackers had stolen digital certificates from its network and have utilized it to sign malicious code. Bit9 is a popular a company that provides software and network security services to a lot of important private firms and also to […]

Pierluigi Paganini February 09, 2013
Whitehole Exploit Kit in the wild

Exploit kit, a name which has become depressingly familiar, crimaware kit that contains malicious code to exploit principal vulnerabilities in large consume product such as browsers, last news is that a new kit named Whitehole has emerged on the underground market. Generally the exploit kits are malicious Web-based applications designed to install malware on computers […]

Pierluigi Paganini February 06, 2013
Threat Report H2 2012 proposed by F-Secure

Today the principal channel for malware diffusion is considered internet, large diffusion of exploit kits and crimeware such as BlackHole, Cool Exploit and Incognito have automated the infection process over the network. Majority of attacks exploits vulnerabilities in large use applications, such as browsers, and the leak of responsive patch management expose users to serious […]

Pierluigi Paganini February 04, 2013
PiceBOT crimeware hit Latin American banking

In the last weeks we discussed on the efficiency of exploit kits, malicious tool kits  that allow to the attackers to exploit a huge quantity of vulnerabilities in victims systems. These products are largely diffused in the underground where is possible to find different tools usable for various purpose, most precious are those kit that […]