The Russian hacker known as “HASH” and “Rev0lver” took control of a BBC server and attempted to sell access to it to other cybercriminals. A hacker compromised a server at the BBC (British Broadcasting Corporation) and started a Christmas Day campaign to sell the access to the machine to other cyber criminals. The evidences of […]
KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability scanning. Krebson security blog posted an interesting article on a new concerning botnet infected more than 12,500 systems disguises itself as a legitimate add-on for Mozilla Firefox to hack websites on a large scale. The botnet, […]
Atrax, yet another commercial crimekit on the black market, a malware able to exploit Tor and that implements numerous features including Bitcoin mining. Atrax is the name of the last crimekit that is sold in the underground market, its particularity is the capability to exploit Tor networks to communicate with Command & Control infrastructure. Jonas […]
Dancho Danchev profiled a new service harvests mobile phone numbers advertised in the underground, the vendor also proposing SMS spamming and phone number verification service. AÂ new service harvests mobile phone numbers advertised in the underground is the demonstration that mobile is becoming a privileged target for cybercrime. Botnets, mobile malware, ransomware, DDoS applications and hacking […]
Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet has published early 2013 the Fortinet’s 2013 cybercrime report, an interesting study on cybercriminal ecosystem, identifying the operations, the motivations, the methods, the resource used and countermeasure adoptable to mitigate the cyber threats As demonstrated […]
Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats. Mobile botnets are malicious infrastructures that are increasing with impressive trend especially the Android botnets, considering the capillary diffusion for the Google mobile OS. Android devices are in the hands […]
An interesting post by Brian Krebs is food for thought on the business behind a cashout service for cybercriminals. Brian Krebs has recently published an interesting post on his KrebsOnSecurity blog regarding the way cyber criminals cashout their money through a dedicated cashout service. The conversion of ill-gotten gains into cash, The âCashoutâ, is considered most risky […]
âSecuring Cyberspace in a borderless world: Vision 2015 and Beyondâ is the title of a High Level Dialogue that was held during The World Summit on the Information Society Forum (WSIS) 2013. The World Summit on the Information Society Forum (WSIS) represents the worldâs largest annual gathering of the ICT for development community, the event is organized […]
A new version of DIY Google Dorks based hacking tool has been released, it is an extremely useful tool for reconnaissance of targets. A Webroot blog post announced that a new version of DIY Google Dorks based hacking tool has been released in the wild and it could be used for mass website analysis, the […]
When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks, but underground offers much more. When the DDoS topic is introduced it’s immediate to link it with the most popular tools usable for this type of attacks such as the popular LOIC, we must consider that underground offer […]