malware

Pierluigi Paganini January 30, 2017
Last Dridex Trojan variant uses a new tactic to bypass Windows UAC

A new variant of the Dridex Trojan recently observed is leveraging a new tactic to bypass the UAC (User Account Control). Researchers at the security firm Flashpoint have discovered a new campaign leveraging on a new variant of the Dridex Trojan that uses a new tactic to bypass the UAC (User Account Control). The Dridex Trojan […]

Pierluigi Paganini January 27, 2017
The Nuke HTTP bot Malware offered for sale on a Dark Web forum

The security researchers at security firm Sixgill discovered a new malware dubbed Nuke HTTP bot offered for sale on a forum in the Dark Web. Darknets are the right places where to find illegal product and services, it is quite easy to find malicious code and also botnets of any type. On December 16th, a […]

Pierluigi Paganini January 26, 2017
Possible Information warfare scenarios behind the Shamoon resurrection

The dreaded Shamoon has resurrected, which are possible political and technological scenarios behind the recent wave of attacks? The dreaded Shamoon has resurrected, a new version called Shamoon 2 was spotted by the security experts at Palo Alto Networks. Saudi Arabia Computer Emergency Response Team (CERT)’s Abdulrahman al-Friah confirmed to Al Arabiya that at least 22 […]

Pierluigi Paganini January 26, 2017
Gmail will stop allowing JavaScript (.js) file attachments starting February 13, 2017

Google announced Gmail will soon stop allowing users to attach JavaScript (.js) files to emails for obvious security reason. Google announced Gmail will soon stop allowing users to attach JavaScript (.js) files to emails for obvious security reason. JavaScripts files, like many other file types (i,e, .exe, .jar, .sys, .scr, .bat, .com, .vbs and .cmd) […]

Pierluigi Paganini January 26, 2017
Several thousand Linux devices infected with the Linux.Proxy.10 Trojan

According to the security firm Dr. Web , thousands of Linux-based devices have already been infected with the Linux.Proxy.10 Trojan. A new Trojan dubbed Linux.Proxy.10 is targeting Linux-based devices transforming them into proxy servers that are used by attackers to protect their anonymity while launching cyber attacks from the hacked systems. Linux.Proxy.10 was first discovered by […]

Pierluigi Paganini January 25, 2017
HummingWhale – HummingBad Android Malware returns even more dangerous than before

Last year, the HummingBad Android malware infected as many as 85 million devices, now it has returned under the new name of HummingWhale. CERT-EU and other sources corroborated Check Point researchers’ findings which recently confirmed a new variant of the ad-fraud-big-money-making, HummingBad, is spreading rapidly on the Android marketplace Google Play.  HummingBad was first seen […]

Pierluigi Paganini January 25, 2017
Saudi Arabia is warning organizations of a wave of Shamoon 2 attacks

Saudi Arabia is warning organizations in the country of a resurrection of the dreaded Shamoon malware. A new strain of the Shamoon 2 malware was spotted by the security experts at Palo Alto Networks, this variant targets virtualization products. Shamoon, also known as Disttrack, was first spotted in a wave of attacks that targeted companies in Saudi Arabia in 2012. Among the […]

Pierluigi Paganini January 24, 2017
Symantec speculates Shamoon 2 attacks aided by Greenbug hackers

Security researchers at Symantec believed that Shamoon 2 attacks leveraged credentials stolen by hackers of the Greenbug group. A few days ago security experts at Palo Alto Networks have spotted a new strain of the Shamoon 2 malware that was targeting virtualization products. In December malware researchers from Palo Alto Networks and Symantec discovered a new variant of Shamoon, so-called […]

Pierluigi Paganini January 24, 2017
Techniques for the manipulation of malicious payloads to improve evasion

Security researchers at the iSwatlab have conducted an analysis of a few methods for the creation of some malicious payloads or shellcodes. This work compares some infamous methods for the creation of malicious payloads or shellcodes. These payloads must be used to create a remote connection between the victim’s machine and the attacker’s machine that […]

Pierluigi Paganini January 22, 2017
The author of the NeverQuest banking Trojan arrested in Spain

The Spanish law enforcement has arrested an alleged Russian Vxer suspected of developing the infamous Neverquest banking Trojan. Today I report another success of law enforcement, the Spanish police have arrested an alleged Russian Vxer suspected of developing the infamous Neverquest banking Trojan. The malware was developed to target financial institutions across the world. Lisov is suspected of being […]