search

Date range
Filters

1044 results

Pierluigi Paganini July 28, 2014
Hackers exploit cloud services to build Money-Mining Botnet

Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud computing is becoming the paradigm most abused by cybercrime, cloud architectures represent privileged targets of cyber criminals that desire to steal data they contain or to abuse their resources to conduct cyber attacks. Two researchers, Rob […]

Pierluigi Paganini July 19, 2014
Critroni, a sophisticated ransomware which uses Tor Network as C&C

A security researcher has detailed Critroni ransomware, a new sophisticated malware which is being sold in different underground forums. In 2013 ransomware were among the menaces that monopolized the threat landscape, malware such as Cryptolocker infected hundreds of thousand machines worldwide. Critroni (aka CTB-Locker) is the name of the last ransomware which captured the attention of security experts, the malware […]

Pierluigi Paganini July 15, 2014
Kronos, the new banking trojan from Russian underground

Experts at Trusteer have recently discovered an adv on the Russian underground market regarding a new financial Trojan dubbed Kronos. Russian underground is probably the most prolific market for sale of banking malware, malicious code like Citadel, Zeus, Gozi have infected millions computers worldwide dominating the malware threat landscape. The huge demand for banking trojan  is creating the conditions […]

Pierluigi Paganini July 10, 2014
Facebook dismantled Lecpetex botnet which infected 250,000 Computers

Facebook in a joint operation with the Greek Cyber Crime Division dismantled the Lecpetex botnet, which infected 250,000 Computers in different countries. Facebook has announced to have successfully conducted the takeover of the Lecpetex botnet  in Greece. The bad actors operating in Greece were using the popular social media platform for illicit activities, including data stealing, malware distribution […]

Pierluigi Paganini July 07, 2014
Cisco warns on combined spear phishing and exploit attacks

Cisco’s Threat Research Analysis and Communications (TRAC) uncovered an extremely targeted spear phish attack on high-profit companies in Europe. A new APT has been discovered by CISCO targeting high-profit companies in Europe, including businesses working in banking, oil and entertainment industries. The attackers adopted as attack vector the email in a spear phishing campaign. According to the alert […]

Pierluigi Paganini June 29, 2014
Selfmite, the rare Android worm which spreads itself by sending SMS

Experts at AdaptiveMobile discovered a rare Android SMS worm dubbed Selfmite which spreads itself by sending SMS including a malicious link to the contact list. Security researchers at AdaptiveMobile have discovered a rare Android malware dubbed Selfmite that propagates via SMS text messages, the worm in fact sends malicious links to 20 contacts present in the device owner’s address book. Selfmite […]

Pierluigi Paganini June 16, 2014
Fake Versions of World Cup 2014 Apps targeting Android users

Security Experts at Trend Micro have discovered different World Cup themed malicious application targeting Android mobile devices. The World Cup 2014 is an excellent occasion for cyber criminals to trick users with social engineering techniques into downloading any kind of malicious content. Of course mobile users are a privileged target for cyber criminals, different World Cup-themed […]

Pierluigi Paganini June 12, 2014
opHackingCup, Anonymous is targeting Brazil WorldCup

As promised the collective Anonymous has started the opHackingCup hacking campaign against the Brazilian Government agencies and many other organizations. The group of Anonymous hacktivists a few hours before the start of the Brazil World Cup have started its hacking campaign against Brazilian Government organizations’ websites and official World Cup website (www.worldcup2014.gov.br), many other organizations are suffering […]

Pierluigi Paganini June 05, 2014
TROJ_POSHCODER A ransomware uses Windows PowerShell features

Malware analysts at Trendmicro have discovered a new Ransomware malware using feature of Windows PowerShell which targeted English language users. Ransomware is one of the cyber threats that has created major problems last year, with increasing frequency cyber criminals gangs have opted for an extortion scheme to immediately monetize their efforts. Security expert have observed a surge […]

Pierluigi Paganini May 28, 2014
Extortion scheme based on ransom request hit Australian Apple Users

Cybercriminals have targeted a large number of Apple’s iCloud users with a sophisticated extortion scheme based on ransom request in Australia. The 2013 is considered the year of ransomware, the number of infections related to this kind of threat has reached levels never seen before. Cryptolocker is without doubts the most popular malware of this type, […]