Security experts at Fortinet uncovered a new strain of the Vawtrak banking Trojan is implementing an obscuring mechanism based on the Tor2Web service. The authors of the banking Trojan Vawtrak are adopting a new tactic to hide the traffic to its servers, they are exploiting the Tor2Web service to masquerade malicious connections. In the past, criminal crews behind […]
Malware researchers at Trend Micro have discovered a news strain of the malumPoS used to target hospitality, food and beverage, and retail industries. Security experts at Trend Micro have discovered a new strain of the MalumPoS malware that was reconfigured to compromise PoS systems based on the Oracle® MICROS® platform. Trend Micro was the first […]
A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent “malicious” services and illegal products. Black Markets are places on the web where it is possible to acquire or rent “malicious” services and products, these markets are growing fast and are becoming very popular in […]
Eataly NYC confirmed that New York retail location has been victim of a security incident, hackers used a PoS malware to steal customers’s card data. The Italian food market Eataly has confirmed a data breach occurred earlier this year. According investigators the data breach could have exposed data related to payment cards over a four-month period. […]
A new malicious phishing campaign is spreading CryptoWall ransomware in the wild, the expert Michael Fratello has analyzed it for us. Just a reminder to all — CryptoWall 3.0 is still very much active, with phish tactics that I think are less effective, but who knows; maybe they’re seeing great success with this method. Personally, […]
US Government announced that a major data breach likely backed by Chinese hackers caused the exposure of data belonging to millions of government workers. Once again a data breach interested systems of the US government, the Obama administration on Thursday confirmed to have been the victim of a major cyber attack. According to the US […]
A new Facebook scam in the wild that aim to steal sensitive data proposing a “Facebook Recovery” Accounts that share malicious links. It’s not new that Facebook it’s the perfect place to try to get precious information and financial gain since it aggregates many people, crossing all generations. The popular social network is very attractive […]
The APWG Global Phishing Survey 2H2014 seeks to understand what the phishers are doing, and how, by quantifying the scope of the global phishing problem. The Anti-Phishing Working Group (APWG) has published the “Global Phishing Survey 2H2014“, a report that comes with some interesting numbers on phishing activities. The Global Phishing Survey 2H2014 report states […]
ThreatConnect has conducted further investigations on the Rombertik malware and traced a malicious sample they analyzed to a Nigeria-based man. Lately Rombertik have been making the headlines of security related news, I wrote on SecurityAffairs about the malware a few weeks ago, last update from security researchers at ThreatConnect is that a new analysis traced […]
Security experts discovered a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication proxy. A recent post published on http://blog.0x3a.com/ it was described a new njRat campaign using old tactics, making use of compromised websites as a third layer, communication proxy. Using FakeAV tactics was in vogue some years […]