cyber espionage

Pierluigi Paganini January 27, 2016
Government Agencies probed over use of backdoored Juniper equipment

The U.S. House Oversight and Government Reform Committee is probing US Government Agencies over use of backdoored Juniper equipment. A number of US Government Agencies are concerned about the use of Juniper firewalls affected by the recently uncovered backdoor. The U.S. House Oversight and Government Reform Committee has sent letters to dozens of government agencies and departments asking […]

Pierluigi Paganini January 23, 2016
New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]

Pierluigi Paganini January 22, 2016
Potentially backdoored AMX equipment being used by US President Obama and US Military

Experts from the security firm SEC Consult discovered a backdoor in the AMX equipment being used by US President Obama and the US Military. AMX is a company that supplies communications systems and building control equipment to the US military, the White House and many other security organizations in the States. The particularity of these systems is the […]

Pierluigi Paganini January 11, 2016
The BlackEnergy malware was a key element of the Ukraine power outage

According to security experts the BlackEnergy malware was a key element of the attack against Ukrainian power grid that caused the power outage.  On December 23, the entire Ivano-Frankivsk region in Ukraine suffered a major power outage, according to security experts and the Ukrainian Government the attackers used a destructive varian of the popular BlackEnergy […]

Pierluigi Paganini January 11, 2016
The German intelligence agency BND resumed surveillance activities with the NSA support

According to the German media the German intelligence agency BND has resumed the monitoring activities conducted in a joint effort with the US NSA. It seems that the German government has never suspended the surveillance activities on its unaware population, to be precise monitoring activities conducted in a joint effort with the US NSA have been […]

Pierluigi Paganini January 06, 2016
Final rule implements the Executive Order 13694. US can apply economic sanctions in response to cyber attacks

The US Government issued a final rule implementing the Executive Order 13694. US can apply economic sanctions in response to cyber attacks. According to a final rule published in the Federal Register on the last day of 2015 (Dec. 31, 2015),  US can now apply economic sanctions in response to cyber attacks. The US Government assigned to […]

Pierluigi Paganini January 05, 2016
Hackers cause power outage with malware in Ukraine. Is it an Information warfare act?

Hackers cause power outage with the BlackEnergy malware in Ukraine. Is it an Information warfare act? Cyber security of ICS e SCADA systems in the critical infrastructure is essential, these components are a privileged target of cyber criminals and state sponsor hackers. The most popular SCADA attack in the history is the one conducted against control systems […]

Pierluigi Paganini January 04, 2016
China hacked thousands of Hotmail accounts belonging to Tibetan and Uighur minorities

After many years, Microsoft admitted that Chinese authorities hacked thousands of Hotmail accounts, belonging to China’s Tibetan and Uighur minorities. After many years, Microsoft finally concluded that Chinese authorities indeed hacked thousands of Hotmail accounts, belonging to China’s Tibetan and Uyghur minorities, but at the time did not warn the users, allowing the victims to […]

Pierluigi Paganini December 24, 2015
Roaming Tiger Hackers targets Russian organizations for espionage

Security researchers from ESET uncovered the Roaming Tiger hacking campaign, bad actors in the wild are targeting Russian organizations. Roaming Tiger is the name of a cyber espionage campaign targeting high profile organizations in Russia and former Soviet Union countries, including Belarus, Kazakhstan, Kyrgyzstan, Tajikistan, Ukraine, and Uzbekistan. The Roaming Tiger campaign was discovered by experts at […]

Pierluigi Paganini December 23, 2015
Hackers in the wild attempt to exploit the Juniper Backdoor

A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the Juniper backdoor. Shortly after Juniper posted the advisory related to the presence of unauthorized code in the OS of some of its Firewalls, HD Moore, the developer of the Rapid7′ Metasploit Framework, revealed that approximately 26,000 […]