backdoor

Pierluigi Paganini July 12, 2013
HP warns on presence of backdoor in storage devices

HP publicly admitted the presence of backdoor in its StoreVirtual storage products designed to respond to the needs of virtualized environments. HP publicly admitted the presence of backdoor in its storage products, in particular the company revealed the presence of an undocumented administrative account in the product family StoreVirtual designed to respond to the needs of virtualized […]

Pierluigi Paganini June 16, 2013
RARSTONE, TrendMicro revealed Naikon cyberespionage campaign

RARSTONE is the name of the RAT (REMOTE ACCESS TOOL) used in a cyber espionage campaign dubbed “Naikon” uncovered by security experts at TrendMicro. Security experts at TrendMicro revealed to have detected the RARSTONE RAT studying targeted attacks across Asia (e.g. India, Malaysia, Singapore, and Vietnam) conducted against various companies belonging to different sectors such […]

Pierluigi Paganini May 13, 2013
The offensive approach to cybersecurity, motivations and risks

Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to defend their assets from the continuous cyber attacks. The press is getting used to news of cyber attacks against companies and government agencies, to date, the trend of the representatives of the cybersecurity of these entities […]

Pierluigi Paganini May 12, 2013
Apple decrypts seized iPhones for law enforcement

Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]

Pierluigi Paganini April 29, 2013
Sophisticated Apache backdoor serving Blackhole exploit kit detected

Securi security firm detected a new sophisticated  Apache backdoor used to hijack traffic  to malicious website serving the popular Blackhole exploit kit. Securi security firm detected a new sophisticated  Apache backdoor used to hijack traffic to malicious website serving the popular Blackhole exploit kit. The company published a blog post describing the new Apache backdoor that according […]

Pierluigi Paganini January 14, 2013
Nokia and the accusation of MITM attack

The charge is heavy, according to some experts, Nokia analyzes user’s traffic officially to increase performance compressing data on some of its mobile devices. According many experts the popular company is responsible of the hijacking of user’s traffic on its servers, that is the case for the Nokia Asha models, for this reason on internet […]

Pierluigi Paganini January 07, 2013
Iran and India, control and monitoring of networks

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that low enforcement  of the country is developing a software for “smart control” of social-networking sites, the authorities have understood that the control of the powerful platforms is more important filtering. Moghadam exposed the consideration made […]

Pierluigi Paganini November 21, 2012
Malware hides C&C server communications using Google Docs function

The ways explored by malware creators are unlimited, recently Symantec has announced the discovery of a new operational mode for backdoor trojan Makadocs, the security firm has in fact reported that a variant of malware hides its command-and-control (C&C) server communications using a legitimate Google Docs function. Backdoor.Makadocs is a Trojan horse that opens a […]

Pierluigi Paganini October 16, 2012
Flame, miniFlame, the mystery of an on going cyber espionage campaign

Last May The Iranian Computer Emergency Response Team (MAHER) detected a new targeted malware which hit the country, that has been named Flame, also known as Flamer or Skywiper, due the name of  its main attack module. MAHER wasn’t the only one to detect the agent, also Kaspersky Lab and CrySyS Lab identified the new dangerous malware, recognized […]

Pierluigi Paganini September 16, 2012
Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences. But what’s happen if we discover the malware inside the controller of ordinary object that […]