From August 2015 to February 2016 Buhtrap group managed to conduct 13 successful attacks against Russian banks for a total amount of $25.7 mln. Since August of 2015, the Buhtrap group has conducted 13 successful attacks against financial institutions stealing more than ₽1.86 billion RUB ($27.4M USD). In April 2015, ESET discovered a malware campaign dubbed Operation Buhtrap, […]
Over the weekend Apple customers who were looking for the latest version of Transmission were infected by KeRanger MAC OS X ransomware. Bad news for Apple customers, their systems were targeted for the first time over the weekend by a ransomware campaign. The experts at Palo Alto Networks Unit 42 who discovered the malicious campaign reported that Apple […]
TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide. Thinking of a unique “global” underground ecosystem is an error, every community has its own characteristics, the criminal crews that […]
ProofPoint uncovered a new cyber espionage campaign dubbed Operation Transparent Tribe targeting Indian diplomatic and military entities. A new cyber espionage campaign dubbed Operation Transparent Tribe is targeting diplomats and military personnel in India. The researchers at Proofpoint who have uncovered the hacking campaign confirmed that threat actors used a number of hacking techniques to hit the […]
According to a study conducted by the experts at Arbor’s ASERT Team a day attack with a DDoS booter cost $60 and can cause $720k in damage. We have discussed several times about the concept of cybercrime-as-a-service, today I’ll show you a case related the offer for rent of distributed-denial-of-service (DDoS) attacks for less than US$60 per day. […]
Which are the usernames and passwords used by hackers when they scan the internet indiscriminately? Give a look to the Rapid7′ report Recently the firm Splashdata revealed in its annual report on the worst 2015 passwords (“123456” and “password”), today I desire to present you a new interesting study on passwords conducted by Rapid7. The experts used Heisenberg, […]
A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]
Securing Hospitals is a report issued by Independent Security Evaluators that demonstrates how hackers can hack hospitals putting lives in danger. A group of experts from the Independent Security Evaluators research team have tested the security of hospital networks, demonstrating how it is possible to gain access to critical medical equipment in attacks they say could put lives in danger. […]
2015 Gemalto Breach Level Index report confirmed the increased interest of threat actors in Government and healthcare data. As per the security firm Gemalto, Government and healthcare have overwhelmed the retail area as most-focused for information breaks. An aggregate of 1,673 information ruptures prompted 707 million information records being traded off worldwide amid 2015, as […]
The Operation BlockBuster Coalition has disclosed the results of its investigation on the activities of the Lazarus Group that is believed to be behind the Sony Pictures hack. State-sponsored hackers allegedly behind the Sony Pictures hack have been linked to other security breach suffered by a number of companies in South Korea. The FBI blamed the North Korea, the […]