malware

Pierluigi Paganini December 13, 2015
Torrent websites infected 12 million Internet users per month

According to a new study conducted by researchers at Digital Citizens Alliance and RiskIQ almost one-third of the 800 torrent websites served malware. People believe that the best way to see a film or get a software is downloading from one of the numerous torrent websites online. Probably there is something that you should know. According […]

Pierluigi Paganini December 13, 2015
LATENTBOT, one the highly obfuscated backdoor in the wild

Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. According to FireEye the LATENTBOT remained undetected since 2013 infecting computers in US, UK, South Korea, Brazil, United Arab Emirates, Singapore, Canada, […]

Pierluigi Paganini December 11, 2015
New Spy Banker Trojan Telax exploits Google Cloud Servers

Security firm Zscaler discovered a malicious campaign based on a new strain of the Spy Banker banking malware. Security experts at Zscaler discovered a malware-based campaign relying on a new strain of Spy Banker banking malware. Spy Banker is an old threat, it was first detected in 2009, the new variant spreads over social media, […]

Pierluigi Paganini December 08, 2015
BackStab Malware steals iOS and BlackBerry Backups

Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups. Security experts at Palo Alto Networks have uncovered a new strain of malware dubbed BackStab that steals local mobile data backups and transfer it to the C&C server. The malware is not able to […]

Pierluigi Paganini December 05, 2015
Rekoobe a new malware targeting Linux users

Experts at Russian anti-virus firm Dr.Web discovered Rekoobe, a new malware that is targeting Linux systems. Rekoobe is a new malware that is targeting Linux systems, the discovery was made by experts at Russian anti-virus firm Dr.Web. Dr.Web discovered the Rekoobe Trojan in October, then its experts analyzed the threat in the following two months. The Rekoobe Trojan was initially developed […]

Pierluigi Paganini December 04, 2015
Ponmocup, never underestimate a botnet that infected 15 million PCs

Ponmocup is one of the oldest botnet that infected more than 15 million machines across the years, but many experts still ignore it. Ponmocup is one of the largest and oldest botnets in circulation, but many security experts still ignore it. According to the experts at Fox IT, the botnet is underestimated and infected across the years […]

Pierluigi Paganini December 01, 2015
Phishing campaign leveraging on Dropbox targets Hong Kong media

Security experts at FireEye have uncovered an ongoing phishing campaign leveraging Dropbox account linked to “admin@338” as Command and Control platform. Experts at FireEye have discovered an ongoing phishing campaign using a Dropbox account linked to “admin@338” as the delivery platform. The account ” admin@338 ” was also used in the past to deliver malware, but […]

Pierluigi Paganini December 01, 2015
Pro PoS, a new PoS malware available for sale in the underground

A new strain of PoS malware dubbed Pro PoS Solution is available for sale in the underground forums. It’s Christmas also for criminals who have found a new gift under the Christmas tree, a new powerful strain of PoS malware. According to the threat intelligence firm InfoArmor, the new PoS malware dubbed Pro PoS is available […]

Pierluigi Paganini November 27, 2015
Crooks use the Nuclear Exploit Kit to serve CryptoWall 4.0

The popular Nuclear Exploit Kit has been used for the first time to serve the ransomware CryptoWall 4.0. The Nuclear exploit kit is one of the privileged weapon in the arsenal of cyber criminal groups, now the popular crimeware kit has been used to serve the ransomware CryptoWall 4.0. In the past, criminal crews used the […]

Pierluigi Paganini November 25, 2015
How The Russian Abused Twitter as C&C in Hammertoss Malware? Python Answers

Today, we will replicate a technique which has been used by recent, sophisticated and hard to trace a Russian malware called Hammertoss. Today, we will replicate a technique which has been used by recent, sophisticated and hard to trace a Russian malware called Hammertoss, the creators of this malware has abused multiple well-known sites like Twitter […]