Cybercrime

Pierluigi Paganini April 10, 2014
The Extortion is a common practice in the cyber criminal ecosystem

According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the cyber context. Extrotion is becoming a worrying inclination in the cyber criminal ecosystem, the number of targeted attacks that request money in change of a suspension of the hostilities and to give back to the victims […]

Pierluigi Paganini April 08, 2014
Symantec on a fake voting campaign used to steal Facebook credentials

Security experts at Symantec observed a new phishing campaign based on a fake voting application used to steal victim’s credentials. Phishing is a very dangerous threat for Internet users, nearby classic techniques new forms of phishing are exploiting new platforms like mobile and social networks. Phishers continuously improve their techniques to be able to harvest […]

Pierluigi Paganini April 07, 2014
New Zeus trojan variant digitally signed in the wild

Security researchers at Comodo have detected a new Zeus trojan variant enhanced with digital signature of its source code to avoid detection. The security community is once again menaced by Zeus banking trojan, a new variant of the malicious  ZeuS Trojan has been identified by researchers at Comodo AV labs. This instance presents an interesting feature, it is […]

Pierluigi Paganini April 05, 2014
Persistent XSS in Top Website enables large-Scale DDoS attack

Incapsula firm discovered the exploitation of a persistent XSS vulnerability in one of the world most popular website to run a large scale DDoS attack. Recently Cloud-based security service provider Incapsula detected an application layer DDoS attack conducted hijacking a huge volume of traffic to victims website. The website of Incapsula customer was flooded by a DDoS attack, over […]

Pierluigi Paganini April 04, 2014
Android Oldboot B, the most dangerous and complex bootkit of ever

Chinese researchers from “360 Mobile Security” detected Android Oldboot.B malware, until today the most complex bootkit which infected millions of devices. A new sophisticated Android Bootkit has been detected by Chinese Security Researchers from “360 Mobile Security“, its name is Oldboot.B and appears as an evolution of its predecessor Oldboot.A. According the researchers Oldboot.B could be considerable as […]

Pierluigi Paganini April 02, 2014
How Coremex malware monetizes search engine Hijacking

F-Secure has identified a malware dubbed Coremex that takes advantage of plugin functionality provided by browsers to hijack search engine results. Search engine are a strategic component in the successful execution of any attacks, we saw in the past Black SEO campaigns conducted with the primary intent to provide results that help the attackers to […]

Pierluigi Paganini March 29, 2014
Reading the Global Threat Intelligence Report (GTIR)

The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013. The NTT Innovation Institute has released the new Global Threat Intelligence Report (GTIR), a document structured to raise awareness of the rapidly evolving global threat landscape. The GTIR was based on threat intelligence and attack data from […]

Pierluigi Paganini March 28, 2014
Netcraft stats on the increasing abuse for WordPress installations

More than 12,000 phishing sites analyzed by Netcraft are hosted on compromised WordPress installations, the websites were used also to serve malicious code. Netcraft internet services company published a statistic which shows that nearly 12,000 WordPress instances were compromised in February, the attackers used the popular CMS to conduct phishing campaigns against targeted family of users, […]

Pierluigi Paganini March 27, 2014
Gameover ZeuS is Targeting recruitment websites

Security experts at F-Secure have detected a new variant of Gameover ZeuS financial Trojan which is targeting recruitment websites. Zeus Trojan is probably one of the most prolific and long-lived malware, security firms have discovered in the last years numerous variant even more sophisticated. After the public release of it source code, principal security firms have […]

Pierluigi Paganini March 26, 2014
Evolution of the offer in the underground market

RAND nonprofit and Juniper Networks firm published an interesting research on the evolution of the offer in the underground market. The cybercriminal underground is a prolific market able to provide any kind of tools and services for illicit ecosystem, one of the most requested articles is the exploits to compromise Internet users’ machines. Russian-language forums are […]