malware

Pierluigi Paganini March 18, 2016
Buhtrap group stole tens of millions of dollars from Russian banks

From August 2015 to February 2016 Buhtrap group managed to conduct 13 successful attacks against Russian banks for a total amount of $25.7 mln. Since August of 2015, the Buhtrap group has conducted 13 successful attacks against financial institutions stealing more than ₽1.86 billion RUB ($27.4M USD). In April 2015, ESET discovered a malware campaign dubbed Operation Buhtrap, […]

Pierluigi Paganini March 17, 2016
How to install the AceDeceiver malware onto any iOS Device

AceDeceiver is the first iOS malware that abuses certain design flaws in Apple’s FairPlay DRM to install malicious apps on iOS devices even non-jailbroken. Hackers are exploiting a flaw affecting the Apple digital rights management technology (DRM) to install malicious apps on every iOS device, even non-jailbroken ones. Last month, security experts at Palo Alto Networks […]

Pierluigi Paganini March 17, 2016
Carbanak Group targets entities in Middle East and US with new TTPs

Proofpoint has collected evidence of new Carbanak group campaigns.The hackers are targeting banks in the Middle East, the United States and other countries. Security researchers at Proofpoint firm sustain to have collected evidence of new Carbanak group campaigns. This time the hackers are targeting banks in the Middle East, the United States and other countries. Last year, Kaspersky […]

Pierluigi Paganini March 16, 2016
EDA2, derived from the educational ransomware, is easy to break

The new strain of educational ransomware EDA2 is infecting systems in the wild, but experts discovered that it is quite easy to neutralize. Do you remember the EDA2 ransomware? It is one of the educational ransomware developed by the security expert Utku Sen, now a new variant of the EDA2 educational ransomware appeared in the wild and the […]

Pierluigi Paganini March 15, 2016
Crooks exploit Oman websites in typosquatting attacks

According to experts at Endgame security firm, crooks are buying many .om domains to carry on typosquatting attacks. Crooks are buying many .om domains to carry on typosquatting attacks. According to experts at Endgame security firm, crooks are buying many .om domains with the purpose to fool clumsy users that mistype .om instead of .com […]

Pierluigi Paganini March 13, 2016
A new massive spam campaign is spreading Locky ransomware downloaders

Experts at Trustwave observed a new massive spam campaign that was sending a JavaScript attachment that downloads Locky ransomware. Ransomware continues to be among most insidious threats in this first part of the year, security researcher have recently observed a spike in the number of Locky ransomware infections. The experts from Trustwave security firm highlighted the […]

Pierluigi Paganini March 10, 2016
Triada Trojan the most sophisticated mobile malware seen to date

Kaspersky Lab recently spotted a new Android malware dubbed Triads Trojan, which they say is the most advanced mobile malware seen to date. Malware researchers at Kaspersky Lab have discovered a new strain of malware, dubbed Triada (Backdoor.AndroidOS.Triada), targeting Android devices, which they consider the most advanced mobile threat seen to date.  The range of […]

Pierluigi Paganini March 07, 2016
KeRanger, the new MAC OS X ransomware that hit Apple users on the weekend

Over the weekend Apple customers who were looking for the latest version of Transmission were infected by KeRanger MAC OS X ransomware. Bad news for Apple customers, their systems were targeted for the first time over the weekend by a ransomware campaign. The experts at Palo Alto Networks Unit 42 who discovered the malicious campaign reported that Apple […]

Pierluigi Paganini February 29, 2016
Chinese ISPs are redirecting users legitimate traffic to malicious sites/ads

Chinese ISPs (internet service providers) are redirecting users legitimate traffic to malicious websites serving malware and ads. China is know to be not very “ortodox” when talking about freedom on the internet, over the time, it developed numerous projects to monitor users’ activity. The Great Firewall Now three Israeli researchers uncovered that Chinese ISPs (China Telecom […]

Pierluigi Paganini February 28, 2016
A DHS report confirms the use of BlackEnergy in the Ukrainian outage, still unknown its role

A report issued by the DHS CERT confirms that the outage in Ukraine was caused by a well-coordinated attack still unclear the BlackEnergy role. In December, a major outage hit a region in Ukraine, more than 225,000 customers were affected by the interruption of the electricity. Security experts speculate the involvement of Russian nation-state actors that have used the BlackEnergy to […]