China

Pierluigi Paganini April 19, 2016
The Four Element Sword, weaponized document builder used in APT Attacks

Experts analyzed a dozen attacks that leveraged on malicious RTF documents created using the same Four Element Sword builder. Security experts at Arbor Networks’ Security Engineering and Response Team (ASERT) have spotted a tool used in advanced persistent threat (APT) attacks against organizations in East Asia. The researchers have analyzed a dozen attacks that leveraged on malicious Rich […]

Pierluigi Paganini April 01, 2016
The dangerous interaction between Russian and Brazilian cyber criminal underground

Kaspersky has analyzed the interaction between the Russian and Brazilian criminal underground communities revealing a dangerous interaction. In the past weeks, we have analyzed the evolution of cyber criminal communities worldwide, focusing on illicit activities in the Deep Web. To simplify the approach we have considered the principal cyber criminal communities (Russia, Brazil, North America, Japan, China, Germany) as separated entities, instead, these ecosystems interact […]

Pierluigi Paganini March 24, 2016
Chinese hacker admitted hacking US Defense contractors

A Chinese national pleaded guilty yesterday, March 23, on charges with hacking trade secrets from US defense contractors. A Chinese national pleaded guilty yesterday, March 23, on charges with hacking trade secrets from US defense contractors. The man, Su Bin (also known as Stephen Su and Stephen Subin), 50, had been charged in a 2014 indictment with […]

Pierluigi Paganini March 07, 2016
Which are principal cybercriminal ecosystems in the Deep Web?

TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting report published by the experts at TrendMicro highlights the differences between the principal underground ecosystems worldwide. Thinking of a unique “global” underground ecosystem is an error, every community has its own characteristics, the criminal crews that […]

Pierluigi Paganini February 21, 2016
Project Cumulus – Tracking fake phished credentials leaked to Dark Web

Project Cumulus – A group of experts at Bitglass used watermarks to track data through the Dark Web and discover how far do phished credentials get. In April 2015, a group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. The experts discovered […]

Pierluigi Paganini February 05, 2016
Australian NSW Government Department of Resources and Energy under attack. Is it Chinese cyber espionage?

According to the NSW Government Department of Resources and Energy Chinese hackers have launched a malware-based attack on its network in December. The Australian NSW Government Department of Resources and Energy revealed that in December 2015 unknown hackers targeted its systems. In the same period, the organization was launching a number of important projects, including […]

Pierluigi Paganini January 20, 2016
The rise of the Brazilian Cybercriminal Underground in 2015

Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. Trend Micro has published a new report on the Brazilian Cybercriminal Underground, a criminal ecosystem that is becoming one of the most important in the world. A first study […]

Pierluigi Paganini December 23, 2015
Hackers in the wild attempt to exploit the Juniper Backdoor

A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the Juniper backdoor. Shortly after Juniper posted the advisory related to the presence of unauthorized code in the OS of some of its Firewalls, HD Moore, the developer of the Rapid7′ Metasploit Framework, revealed that approximately 26,000 […]

Pierluigi Paganini December 22, 2015
Who planted the Juniper ScreenOS Authentication Backdoor?

Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out. While the FBI is investigating the case searching for responsible for the introduction of a backdoor in a number of Juniper network devices, a number of speculation are circulating on the Internet.  Juniper Networks is a […]

Pierluigi Paganini December 21, 2015
Chinese hackers target Taiwanese Opposition Party and media

Security experts at FireEye have uncovered a spear phishing campaign managed by Chinese hackers that is targeting Taiwan Opposition and Media ahead of the vote in January. According to FireEye a group of Chinese hackers is targeting Taiwan’s opposition party and journalists, security experts and officials. The attacks are occurring weeks away from a Taiwanese presidential […]