malware

Pierluigi Paganini July 28, 2017
Malware experts at ESET released a free tool for ICS Malware analysis

Security experts from ESET that spotted the Industroyer malware used against Ukraine’s power grid released a free tool for ICS Malware analysis ESET researchers Robert Lipovsky and Anton Cherepanov have released a free tool for the analysis of ICS malware. The security duo is the same that discovered the CrashOverride/Industroyer malware that targeted the Ukraine’s power […]

Pierluigi Paganini July 27, 2017
Google experts blocked a new targeted malware family, the Lipizzan spyware

Google has identified a new strain of Android malware, the Lipizzan spyware, that could be used as a powerful surveillance tool. Malware researchers at Google have spotted a new strain of Android spyware dubbed Lipizzan that could exfiltrate any kind of data from mobile devices and use them as surveillance tools. The Lipizzan spyware is a project developed […]

Pierluigi Paganini July 26, 2017
Chinese Police dismantled the behind the Fireball adware campaign that infected more than 250 Million PCs

Chinese authorities arrested eleven members of the gang behind the Fireball adware campaign that infected more than 250 Million PCs. Chinese police have identified and arrested individuals suspected to be the operators behind the massive adware campaign that infected more than 250 Million computers across the world earlier this year. In June, researchers at security firm Check Point discovered the […]

Pierluigi Paganini July 26, 2017
CrowdStrike presented the fastest and largest cybersecurity search engine

CrowdStrike Inc., the leader in cloud-delivered endpoint protection, announced the fastest and largest cybersecurity search engine. Security firm CrowdStrike, the leader in cloud-delivered endpoint protection, announced a significant improvement of its Falcon platform that has been integrated with a powerful cybersecurity search engine. According to the company the cybersecurity search engine has high performance, it claims it […]

Pierluigi Paganini July 25, 2017
Fruitfly macOS and OS X backdoor remained undetected for years

A new mysterious strain of macOS and OS X malware dubbed Fruitfly went undetected by malware researchers and security software for at least five years. Fruitfly is a backdoor that could be used by attackers to gain full control over the infected systems by implementing many spying features. Fruitfly has the ability to capture screenshots, keystrokes, […]

Pierluigi Paganini July 24, 2017
Spring Dragon APT used more than 600 Malware samples in different attacks

The threat actor behind Spring Dragon APT has been developing and updating its wide range of tools throughout the years, new attacks reported in South Asia. According to a new report published by Kaspersky Lab, the China-linked APT group Spring Dragon (aka Lotus Blossom, Elise, and Esile) has used more than 600 malware samples in […]

Pierluigi Paganini July 24, 2017
SLocker decompiled code leaked online for free, a gift for crooks and hackers

The SLocker code leaked online, it is one of the oldest mobile lock screen and file-encrypting ransomware. The code of the SLocker Android malware, one of the most popular Android ransomware families, has been leaked online for free, allowing crooks to develop their own variant of the threat. SLocker was first spotted in 2015, it is the […]

Pierluigi Paganini July 22, 2017
A Russian man involved in the development and maintenance of Citadel was sentenced to five years in prison

The Russian hacker Mark Vartanyan was sentenced to five years in prison for his involvement in the development and maintenance of the Citadel botnets. It’s a terrific moment for cyber criminals, law enforcement worldwide continues their fight against illegal activities online and the recent shut down of AlphaBay and Hansa black markets demonstrate it. The news of […]

Pierluigi Paganini July 21, 2017
Microsoft sued Fancy Bear to gain control of the domains used in the cyber espionage campaigns

Microsoft used the lawsuit to disrupt a large number of cyber espionage campaigns conducted by infamous Fancy Bear APT hacking group We have discussed several times about hacking back and the case we are going to analyze is a good example of an alternative approach to hit back an APT group. Microsoft used the lawsuit […]

Pierluigi Paganini July 21, 2017
Modified versions of Nukebot Trojan spotted in wild after code leak

Apparently, different cyber gangs are using modified versions of the Nukebot in wild after code Leak occurred in March 2017. Crooks are adapting the leaked source code for the Nukebot banking Trojan to target banks in the United States and France and to steal mail client and browser passwords. Apparently, different cyber gangs are using modified versions of […]