Cybercrime

Pierluigi Paganini February 22, 2015
Rule 41 – Google against the expansion of FBI hacking powers

The Us Justice Department’s proposal to grant FBI Rule 41 specific hacking rights is under high scrutiny. While the amendment is being reviewed, the Advisory Committee on Criminal Rules will consider public objections, including a letter from Google. The amendment to the Federal Rule of Criminal Procedure 41 (Rule 41) would expand jurisdiction for judges to […]

Pierluigi Paganini February 21, 2015
Verisign report – The rise of DDoS attacks as a service

A new report published by Verisign provides useful data related to the recent evolution of DDoS attacks and the services that offer them. DDoS attacks are even more dangerous for every organization that exposes its resources and services on the Internet, recent attacks against Sony PSN network and XBox live service demonstrate it. DDoS attacks despite […]

Pierluigi Paganini February 18, 2015
25 billion Cyberattacks hit systems in Japan during 2014

The National Institute of Information and Communications Technology revealed that more than 25 billion cyberattacks hit  systems in Japan during 2014. I decided to write this post to highlight the importance of a cybersecurity posture for any government. When the majority of people thinks to cybersecurity, has no idea of principal cyber threats and their […]

Pierluigi Paganini February 18, 2015
BadUSB attack and the Industrial control systems

Industrial control systems are in danger of being hacked by using a modified version of the BadUSB attack says Michael Toecker in his presentation at the Security Analyst Summit 2015 in Cancun. Not that long ago, BadUSB swept across the cybersecurity community as one of the hottest hacks of the year. BadUSB featured the ability […]

Pierluigi Paganini February 17, 2015
Ali Baba, the APT group from the Middle East

Adrian Nish of BAE System presented the results of its investigation on the Ali Baba APT group operating from the Middle East that hit Western companies. Yesterday the Kaspersky Lab team revealed the results of its investigation on the hacking crew dubbed the Equation group, a team of hackers that demonstrate extraordinary capabilities and sophisticated tactics, […]

Pierluigi Paganini February 17, 2015
How attackers use phishing kits for their campaigns

How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of attacks? Most of the major banks and companies that suffer this type of attacks make people aware of phishing, but despite the high level of awareness of the threat, the phenomenon does not slow down, indeed seems to accelerate […]

Pierluigi Paganini February 17, 2015
PoS malware infected payment systems at the Jefferson National Parks Association

Jefferson National Parks Association discloses POS breach at Gateway Arch stores caused by a malware infection of the payments systems. Jefferson National Parks Association announced on Friday about malware found on Point-of-Sale (POS) Systems deployed by two gift shops named Gateway Arch located in St. Louis. So far, it has been confirmed that most of […]

Pierluigi Paganini February 16, 2015
Gemalto published the Breach Level Index Report. More than 1 billion data records were stolen

Gemalto has issued the 2014 Breach Level Index based on data gathered from publicly-available information about data breaches throughout the world. A new research published by Gemalto security firms reveals that more than 1 billion data records were stolen in more than 1,500 different data breaches last year. The company highlighted the significant increase in both corporate breaches and data […]

Pierluigi Paganini February 15, 2015
Carbanak cybergang swipes over $300 million from banks

Kaspersky discovered that a multinational gang of hackers dubbed Carbanak cybergang has stolen at least $300 million from 100 financial institutions. A group of cybercriminals used a malware to steal at least $300 million from banks and other financial institutions worldwide, according to a report published Saturday by The New York Times. The hackers have named […]

Pierluigi Paganini February 12, 2015
The value of personal data in the criminal underground

Which is the cost of personal data in the criminal underground? How cyber criminals steal personal data? Which is the cashout process? What is the underground economy? Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime. It’s within these […]