Cybercrime

Pierluigi Paganini January 26, 2015
Defending Against Spear Phishing, RAT Deployment and Email Tracking

Gary Miliefsky explain how Spear Phishing works as well as Email Tracking that allow the sender to collect very useful data on the recipient. Defending Against Spear Phishing, RAT Deployment and Email Tracking In my 2015:Year of the RAT Threat Report (see: http://www.snoopwall.com/reports/),  I described how I felt Sony Pictures Entertainment (SPE) was attacked by […]

Pierluigi Paganini January 26, 2015
Topface data breach – 20 Million records exposed

Topface, the Russian-based dating site, has been hacked, User names and e-mail addresses of 20 million visitors are offered for sale online. Nearly 20 Million User names and e-mail addresses of visitors to the Russian-based dating website Topface have been available for sale online, the news first reported by Bloomberg. According to Daniel Ingevaldson, chief technology […]

Pierluigi Paganini January 26, 2015
Davos – experts warned about major cyberattacks

Davos World Economic Forum Annual Meeting 2015 – The elite of experts confirms the rising technological risks, notably cyber attacks. The World Economic Forum in Davos brings together some 2,500 of the top players in the sphere of politics, finance and business. The elite of experts meeting in Davos for the World Economic Forum Annual […]

Pierluigi Paganini January 25, 2015
Click-fraud malware drives millions of views to YouTube videos

Scammers are earning advertising revenue by spreading click-fraud malware Tubrosa, which sends compromised computers to their YouTube videos. A new Click-fraud malware campaign aimed at earning money by using the victim’s machine to view YouTube videos and benefits from ads embedded in them. The malicious campaign, discovered by experts at Symantec, has targeted users around the world […]

Pierluigi Paganini January 22, 2015
New Angler exploit kit includes a Flash zero-Day

The French security expert Kafeine has discovered an unpatched vulnerability (0day) in Flash Player is being exploited by Angler Exploit Kit. The Angler exploit kit is one of the most popular crimeware kit and according to the French security researcher Kafeine it was enriched with a fresh Adobe Flash zero-day vulnerability. Kafeine has discovered a new variant of the Angler […]

Pierluigi Paganini January 16, 2015
Malvertising Campaign exploited Google AdWords advertising

Experts at Sucury firm have analyzed a malvertising scheme that has hijacked at least two distinct Google AdWords advertising campaigns. Malvertising campaigns are one of privileged attack vector exploited by criminal crews, their efficiency depends on the ability of attackers to compromise large audience channels. In September 2014 Malwarebytes firm discovered a large scale malvertising campaign exploiting Google’s […]

Pierluigi Paganini January 15, 2015
CryptoWall 3.0 hides C&C Communications with I2P Anonymity Network

Security Experts at Microsoft discovered a new variant of CryptoWall 3.0 ransomware that adopts I2P Anonymity Network for C&C Communications. A new version of CryptoWall ransomware has been detected in the wild by experts at Microsoft, just a week after I reported that Cisco’s Talos Security Intelligence and Research Group detected a new strain of the same […]

Pierluigi Paganini January 14, 2015
Skeleton Key Malware modifies the Active Directory authentication process

Dell SecureWorks detected the Skeleton Key malware, which modifies authentication process on Active Directory (AD) systems protected by only passwords. The experts at Dell SecureWorks Counter Threat Unit(TM) (CTU) have recently discovered a malware dubbed Skeleton Key that bypasses single-factor authentication on Active Directory (AD) systems. The attackers can use to have total access to remote […]

Pierluigi Paganini January 13, 2015
Silk Road Reloaded, an important development in the world of black markets

The newborn Silk Road Reloaded black marketplace adopts I2P Anonymous Network and different virtual currency scheme to protect illegal business. The Operation Onymous conducted by law enforcement allowed the seizure of dozens of black markets on Tor Networks. While all the underground marketplaces in the DeepWeb, including Silk Road 2.0, went down due to the operation of […]

Pierluigi Paganini January 12, 2015
Hackers running Linux Operation Windigo are changing tactics targeting porn sites

Security Experts at ESET firm discovered that Windigo campaign is still active and that bad actors are changing their tactics to remain under the radar. Windigo is a sophisticated malware-based campaign uncovered by security Experts at ESET in March 2014, hackers behind the campaign that exploited the Linux/Ebury backdoor compromising more than 500,000 computers and 25,000 dedicated servers. The […]