malware

Pierluigi Paganini February 07, 2015
11 percent of mobile banking apps includes harmful code

A recent study published by RiskIQ security firm revealed that more than 11 percent of mobile banking apps includes harmful code. With the rapid spread of mobile banking services has increased significantly the number of cyber crimes targeting users of major financial institutions. According to an interesting research conducted by the company RiskIQ more than 11 […]

Pierluigi Paganini February 07, 2015
Fake WhatsApp for Web offered in the wild

Cybercriminals are offering worldwide a fake WhatsApp for Web in spam campaign with the intent to serve banking malware and run other kinds of scams. Recently WhatsApp launched its web service that could be used by using Google Chrome and allows users to access all the conversations and messages from the mobile device. “Our web client is […]

Pierluigi Paganini February 06, 2015
Fessleak malvertising campaign used to serve ransomware

Invincea has been monitoring the Fessleak campaign in which hackers leveraged Adobe Flash Player exploits and file-less infections to serve ransomware. Security experts from Invincea are investigating on a new Ransomware campaign originated in Russia that presented many interesting characteristics. The researchers discovered that the attacks started by using file-less infections then moved to the […]

Pierluigi Paganini February 05, 2015
Risks related to the use of digital certificates

A recent report published by experts at Kaspersky Lab revealed that the number of abuses for digital certificates is in constant increase. According to a recent report published by Kaspersky Lab the number of untrusted certificates used to sign malicious code is doubled in the last year. The reason is that there is the wrong […]

Pierluigi Paganini February 04, 2015
Experts uncovered a massive CTB-Locker ransowmare campaign

Security researchers at the CERT team at SociĂ©tĂ© GĂ©nĂ©rale uncovered a new malware campaign which is spreading the CTB-Locker or Critroni crypto ransomware. Security experts at the CERT team at SociĂ©tĂ© GĂ©nĂ©rale discovered a new malware campaign delivering the CTB-Locker or Critroni crypto ransomware. In the past, the criminals used the popular Angler exploit kit in order […]

Pierluigi Paganini February 02, 2015
Hackers stole GigaBytes of Syrian opposition’s data, including battle plans

A report issued by FireEye revealed that hackers have stolen GigaBytes of data from Syrian opposition’s computers, including battlefield plans. A recent report issued by FireEye revealed that hackers tapped into Syrian opposition’s computers and have stolen gigabytes of secret communications and battlefield plans. In mid-2013, ten armed units belonging to the opposition to the Syrian Government were […]

Pierluigi Paganini January 30, 2015
A singular Facebook Trojan has already infected nearly 110,000 Facebook users

Security researcher is investigating in a new strain of Facebook Trojan that in just two days has already infected 1110,000 Facebook users. Social networks represent a privileged attack vector for malware-based attacks, a recent investigation conducted by by the security researcher Mohammad Faghani revealed the existence of a Trojan is circulating among Facebook users. According to the researcher, […]

Pierluigi Paganini January 30, 2015
News Zeus shows significant a evolution in the criminal ecosystem

Researchers at SentinelOne have discovered a strain of the Zeus malware that includes a very sophisticated control panel and evasion techniques. Malware researchers at SentinelOne  have spotted a new Zeus variant that was used to target major Canadian banks, including the National Bank of Canada, the Bank of Montreal and the Royal Bank of Canada. […]

Pierluigi Paganini January 27, 2015
A hacker developed Maldrone, the first malware for drones

Security expert Rahul Sasi has discovered and exploited a backdoor in Parrot AR Drones that allows him to remotely hijack the UAV with the malware Maldrone. The diffusion of drones is alerting government and authorities, small Unmanned Aerial Vehicles (UAVs) are used more frequently in different sectors. The security of drones in both military and […]

Pierluigi Paganini January 26, 2015
Defending Against Spear Phishing, RAT Deployment and Email Tracking

Gary Miliefsky explain how Spear Phishing works as well as Email Tracking that allow the sender to collect very useful data on the recipient. Defending Against Spear Phishing, RAT Deployment and Email Tracking In my 2015:Year of the RAT Threat Report (see: http://www.snoopwall.com/reports/),  I described how I felt Sony Pictures Entertainment (SPE) was attacked by […]