Cybercrime

Pierluigi Paganini June 10, 2016
Necurs Botnet, one of the world’s largest malicious architecture has vanished

The Necurs Botnet, one of the world’s largest malicious architecture, used to spread the dreaded threats appears to have vanished since June 1. In the last months, we have read a lot of news regarding the activities on one of the largest botnet in the wild that was used by crooks to deliver the Dridex […]

Pierluigi Paganini June 10, 2016
CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit Kit instead the Angler Exploit Kit. Crooks behind the CryptXXX ransomware have launched a new campaign leveraging on the Neutrino Exploit Kit instead the Angler Exploit Kit. It was a significant change in the attack chain that was discovered by the experts […]

Pierluigi Paganini June 08, 2016
Companies Are Stockpiling Bitcoin To Quickly Pay Off Ransomware Criminals

New research conducted by Citrix indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast in case of ransomware attacks. New research conducted by Citrix, a corporate networking company, indicates that some businesses are stockpiling Bitcoins so they can pay cybercriminals fast, if their data is held ransom by malicious software. Ransomware […]

Pierluigi Paganini June 07, 2016
Watch out, Angler Exploit Kit is able to bypass Microsoft EMET defense

Security experts from FireEye have observed attacks leveraging on Angler EK to deliver exploits capable of evading the Microsoft EMET security Tool. Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a free security tool designed by Microsoft to implement a supplemental security layer of defense against the exploitation of vulnerabilities affecting applications running on Windows Systems. […]

Pierluigi Paganini June 06, 2016
As of the end of March, 93 percent of all phishing emails contained ransomware

The anti-phishing company PhishMe that observed that as of the end of March 93 percent of all phishing emails contained a ransomware. Ransomware is becoming a privileged instrument of cyber criminals to rapidly earn money, the diffusion of this type of threat is changing the threat landscape scenario, for example, as of the end of March, […]

Pierluigi Paganini June 05, 2016
Sh0ping.su hacked, stolen card data and accounts available for sale

The notorious crime forum Sh0ping[.]su has been hacked by unknowns that leaked online credit card data and stolen accounts. Data breaches are a common problem also for bad actors, in many cases cyber criminals hack websites of competitors to damage their reputation and push out them from the business. Recently we discussed the hacks of […]

Pierluigi Paganini June 05, 2016
Old CVE-2014-3704 flaw in Drupal still exploited in attacks

More than 19 months after its public disclosure the CVE-2014-3704 is still exploited in attacks against Drupal-based websites. It was October 2014, when Drupal patched a critical SQL injection vulnerability (CVE-2014-3704) that was affecting all Drupal core 7.x versions up to the recently-released 7.32 version, which fixed the issue. The patch issued by Drupal fixed the […]

Pierluigi Paganini June 04, 2016
FastPOS PoS malware implements a quick exfiltration method

Trend Micro experts discovered a new strain of Point-of-Sale (PoS) malware dubbed FastPOS that implements a quick and efficient exfiltration technique. Security experts at Trend Micro have spotted a new strain of PoS malware dubbed FastPOS that is able to quickly exfiltrate harvested data. The malware was used by threat actors to target both enterprises and SMBs […]

Pierluigi Paganini June 03, 2016
Ransomware campaigns … how to net $90,000 per year

Experts at Flashpoint published an interesting analysis of a ransomware campaign organized by a small gang of cyber criminals. Cybercrime is a profitable business, last week we reported that according to security experts at Check Point, the creators of the Nuclear EK are gaining nearly 100K USD each month, most victims are in Europe and […]

Pierluigi Paganini May 30, 2016
Android 6.0 Marshmallow permission-granting model is under attack

Malware researchers are warning Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. Android’s latest permission-granting model in version 6.0 Marshmallow is now been targeted by Mobile malware authors. The model  will let users grant permissions only when it is required by the app, rather be accepting all […]