malware

Pierluigi Paganini January 29, 2016
CenterPOS – The evolution of POS malware

Security Experts at FireEye discovered a new strain of POS malware dubbed CenterPOS that is threatening the retail systems. In the last 2/3 years, we have seen a significant increase in the number of POS malware, their diffusion is becoming even more worrying. We read about many high-profile breaches that involved high-complex malware targeting payment systems […]

Pierluigi Paganini January 29, 2016
ATP group uses Word Docs to drop BlackEnergy Malware

The APT group behind the attacks against critical infrastructure in Ukraine is spreading BlackEnergy malware through specially crafted Word documents. Malicious campaigns leveraging the BlackEnergy malware are targeting energy and ICS/SCADA companies from across the world. The threat actors behind the recent attacks based on the popular malware are now targeting critical infrastructure in Ukraine. In […]

Pierluigi Paganini January 27, 2016
Hackers are blackmailing the creator of Open-Source Ransomware

The Turkish security researcher Utku Sen was blackmailed by hackers behind the Magic ransomware to close his projects. The developers behind the open source-based “Magic” ransomware are blackmailing the creator of Hidden Tear and EDA2 in order to force the developer to abandon the projects. Recently I have written about the RANSOM_CRYPTEAR.B ransomware developed Utku Sen starting from a proof-of-concept […]

Pierluigi Paganini January 25, 2016
A flaw in TeslaCrypt ransomware allows file recovering

The victims of the infamous TeslaCrypt ransomware can now rejoice, there is a free tool to decrypt files encrypted by TeslaCrypt and TeslaCrypt 2.0 TeslaCrypt is one of the most insidious ransomware first detected in the wild in 2015, today I have a good news for its victims. TeslaCrypt was first detected in February 2015, the […]

Pierluigi Paganini January 25, 2016
Operators behind Angler Exploit Kit included CryptoWall 4.0

The latest variant of CryptoWall 4.0, one of the most popular and dangerous ransomware threats, has been recently added to the infamous Angler Exploit Kit. In my 2016 Cyber Security Predictions, I have predicted the criminal practices of the extortion will reach levels never seen before. Cyber criminals will threaten victims with ransomware and DDoS attack in […]

Pierluigi Paganini January 23, 2016
New RAT Trochilus, a sophisticated weapon used by cyber spies

Researchers spotted a new espionage campaign relying on a number of RATs including the powerful Trochilus threat. Security experts have uncovered a new remote access Trojan (RAT) named Trochilus that is able to evade sandbox analysis. The Trochilus malware was used to targeted attacks in multi-pronged cyber espionage operations. Experts at Arbor Networks uncovered a cyber […]

Pierluigi Paganini January 22, 2016
Be careful Facebook users, you are under attack!

Facebook users are receiving malicious email delivering malware masquerading as audio message, a similar campaign also targeted WhatsApp users. Social media and instant messaging application are a privileged vector for cyber threats, in many cases bad actors exploited them to spread malicious links and infect a large number of users. Now a new campaign is targeting […]

Pierluigi Paganini January 21, 2016
Asacub Android Malware, the multiform threat

Asacub is a new Android threat that has been used by bad actors to infect thousands of users in Russia in a recent SMS spam campaign. According to the experts from Kaspersky Lab, the Trojan-Banker.AndroidOS.Asacub was first detected as a new spyware Trojan. The experts noticed that one of the C&C servers used by the Asacub Android malware (chugumshimusona[.]com) was also […]

Pierluigi Paganini January 20, 2016
Linux.Ekoms.1 the Linux trojan that takes screenshots

Dr Web discovered a new Malware dubbed Linux.Ekoms.1 designed to target Linux systems and takes screenshots every 30 seconds. Security experts at antivirus company Dr. Web have discovered a new Trojan dubbed Linux.Ekoms.1 designed to target Linux systems. The malware could be used to spy on the victims, it takes screenshots every 30 seconds and saves them […]

Pierluigi Paganini January 18, 2016
Some facts that probably you still ignore on the Stuxnet attack

A collection of interesting info about the Stuxnet attack published years ago by The New York Times, a must-read for experts. The popular cyber security expert Mikko Hypponen has retwitted an old blog post on the Stuxnet malware, a good opportunity to summarize the events and understand what is happened behind the scene. In 2011, The […]