Hacking

Pierluigi Paganini September 04, 2014
AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several industries. Security experts at AlienVault Labs have uncovered a watering hole attack with a singular characteristic, the attackers are using a framework developed for reconnaissance as the primary infection vector. The attackers deployed a malicious JavaScript on the targeted […]

Pierluigi Paganini September 04, 2014
Analyze VirusTotal Metadata to profile hackers

An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad actors. VirusTotal is the Google owned company which offers free checking of URLs and files for viruses and other malicious code, its systems use up to 54 different antivirus software to scan files and URLs provided by the userscheck. Cyber criminals […]

Pierluigi Paganini September 03, 2014
Brazilian cyber criminals targeting home routers

Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers by using a web-based attack. Experts at Kaspersky Lab have uncovered a hacking campaign conducted by Brazilian threat actors which is targeting home routers by using a web-based attack. The hackers are adopting different techniques, […]

Pierluigi Paganini September 03, 2014
Hacking traffic light systems

In this article published on the Infosec Institute are analyzed the principal studies on the security of traffic light systems and techniques to hack them. http://resources.infosecinstitute.com/hacking-traffic-light-systems/ We often see movie scenes in which hackers are able to hack systems for the control of traffic lights, with catastrophic consequences, unfortunately we must be conscious that threat […]

Pierluigi Paganini September 02, 2014
Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for surveillance activities. Seventeen mysterious cellphone towers have been discovered in the USA, they are identical to legitimate towers, the unique difference is related a heavily customized handset built for Android security. According to the Popular Science, […]

Pierluigi Paganini September 02, 2014
Alleged iCloud flaw exploited in Naked celebrity hack

Investigation on celebrities naked pictures leaked online raises suspicion that hackers breached iCloud accounts exploiting a flaw in the “Find my IPhone” feature. An alleged hack of Apple’s iCloud accounts of many celebrities seems to be the cause of the leakage online hundreds of naked photos purportedly belonging to more than 100 actors and singers.  On […]

Pierluigi Paganini August 30, 2014
Bifrose malware leveraging on Tor caught in a targeted attack on a device manufacturer

Security experts at TrendMicro have detected a new variant of the BIFROSE malware leveraging on the Tor network in a targeted attack. Security experts at TrendMicro have been investigating a targeted attack against a device manufacturer when they discovered that BIFROSE malware, a well-known backdoor, has infected the systems of the company.  BIFROSE has been around for many […]

Pierluigi Paganini August 29, 2014
Major cyber attacks hit 5 US banks including JPMorgan

US law enforcement and private security firms are investigating on a series of cyber attacks which hit JPMorgan and other financial institutions. The FBI announced that the Bureau is investigating media reports of cyber attacks on US banks and financial firms, but law enforcement hasn’t provided further information on the incidents neither on the affected companies. […]

Pierluigi Paganini August 28, 2014
Russian Hackers disguise Kelihos bot as Anti-Government Software

Russian Hackers are spreading the Kelihos Trojan leading victims into believing that it is a software to hit Western Governments. Kelihos botnet is still active and exploited by the cybercrime ecosystem to monetize its effort as discovered by security experts at Bitdefender. Cyber criminals have a single purpose, to earn money by any means, for this reason it is […]

Pierluigi Paganini August 27, 2014
A Wide Open Backdoor is present in million Netis Routers

Routers manufactured by Netcore and sold worldwide under Netis brand have a wide-open backdoor that can be fairly easily exploited by threat actors. Experts at TrendMicro discovered that routers manufactured by Chinese security vendor and sold under the brand name Netcore in China have a hard-coded password. The hard-coded password allows attackers to access user’s traffic with a backdoor, […]