cyber espionage

Pierluigi Paganini January 05, 2013
Confidential documents from Japanese politics stolen by malware

Last December Japan Aerospace Exploration Agency was hit again by malware  that stolen secret information on newest rockets from an internal computer, it was not first time for the Japanese agency that was already victim of a cyber attack having same purpose, cyber espionage to obtain information on another technological advanced project related to the […]

Pierluigi Paganini December 28, 2012
DoJ wants to indict state-sponsored hackers. What is the real purpose?

The last couple of years has been characterized by the raise of state-sponsored cyber attacks, governments have increased cyber capabilities to defend their critical infrastructures from offensive originated in the cyberspace but they also improved tactics to offend and spy on foreign government networks. Governments and private business of countries such as US, Japan and […]

Pierluigi Paganini December 18, 2012
Saudi Aramco, war of information on the cyber attack

Last summer a series of cyber attacks hit energy sector, one of the world’s largest oil companies the Saudi Aramco was attacked by a group named the Cutting Sword of Justice. Hackers used the Shamoon malware to attack the systems of the company, fortunately, production environment wasn’t impacted. The malware is able to wipe files from […]

Pierluigi Paganini December 16, 2012
Korean cyber espionage campaign against Russia

Cyber espionage is worldwide recognized one of the most concerning cyber threats mainly operated by governments to steal sensible information to foreign states and private companies. FireEye has revealed a cyber espionage campaign, named “Sanny“, attributable to Korea that hosts command-and-control (C&C) servers used in the attacks, the C&C channel is embedded on a legitimate page […]

Pierluigi Paganini December 14, 2012
The Facebook engagement in the fight against botnets with FBI

Social networks are platforms that have monopolized majority of user’s internet experience, the imperative is to “social”, and everybody share an incredible amount of personal information exposing its digital identity to serious risks. An element of attraction for cyber criminals is the huge number of services, from gaming to payments, that are developing on these […]

Pierluigi Paganini December 12, 2012
The “Intelligent Objects” that surround us

Article published on The Malta Indipendent on December 9th 2012 Technology in the last decade has assumed a fundamental role in our daily lives.  We are increasingly surrounded by discrete intelligent components designed to provide us with more sophisticated choices designed to enhance our personal experience and quality of life.  From our phones, to our home […]

Pierluigi Paganini December 06, 2012
Sophos Security Threat Report 2013, today … tomorrow

Sophos was one of the first security firms that has published a report, Sophos Security Threat Report 2013, on current status of security landscape making predictions for incoming year. The document propose an interesting overview on most common and dangerous cyber threats attempting to determine the level of penetration by different countries. The factors that […]

Pierluigi Paganini December 03, 2012
Japan Aerospace Exploration Agency hit again by malware

The New Your Times has recently published the news the Japan Aerospace Exploration Agency was hit by a virus that stolen secret information on newest rockets from an internal computer. The precious information was stored from a computer in Tsukuba Space Center located in northeast area of Tokyo, where it has been detected a malware that […]

Pierluigi Paganini November 30, 2012
How to turn any phone into a spy device with hardware hack

No peace for mobile environment that due its impressive increase is attracting cyber criminals and hackers like never before. The researcher Atul Alex has presented at last edition of International Malware Conference (MalCon) how it is possible to attack every mobile devices with a special hardware designed using common electronic components. Atul Alex presented a […]

Pierluigi Paganini November 21, 2012
Malware hides C&C server communications using Google Docs function

The ways explored by malware creators are unlimited, recently Symantec has announced the discovery of a new operational mode for backdoor trojan Makadocs, the security firm has in fact reported that a variant of malware hides its command-and-control (C&C) server communications using a legitimate Google Docs function. Backdoor.Makadocs is a Trojan horse that opens a […]