malware

Pierluigi Paganini September 01, 2015
MassVet finds unknown malicious apps in app stores in 10 Sec

A group of researchers have developed a method dubbed Mass Vetting (MassVet) to find unknown malicious apps in app stores in 10 Seconds. A group of University researchers has created a new method for detecting malicious apps running on an Android devices called MassVet. MassVet doesn’t use the old method of signatures scanning, instead it compares […]

Pierluigi Paganini September 01, 2015
ORX Locker, the new Darknet Ransomware-as-a-service platform

Security experts at Sensecy have uncovered ORX-Locker, a Darknet Ransomware-as-a-service platform that could allow everyone to become a cyber criminal. It is becoming even easier to become a cyber-criminal thanks to the model of sale known as malware-as-a-service that offers off-the-shelf malware for rent or sale. Recently malware authors started to offer also Ransomware-as-a-Service (RaaS), in […]

Pierluigi Paganini August 31, 2015
Corebot is the new data Stealer discovered by IBm’s X-Force

Corebot is a new data stealer discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their solutions. Corebot is the name of a new data stealer malware discovered by the experts at IBM Security X-Force while they were analyzing some endpoints protected by their product, the Trusteer Apex […]

Pierluigi Paganini August 28, 2015
Xkeyscore: the secret Germany’s deal with the NSA

An agreement between the German intelligence agency BfV and the NSA allows the access to the XKeyscore platform to return of  data on German citizens. The German weekly Die Zeit disclosed documents that reveal how the German Intelligence did a deal with the NSA to get the access to the surveillance platform XKeyscore. Internal documents show that Germany’s domestic intelligence agency, […]

Pierluigi Paganini August 28, 2015
Symantec discovered 49 New Modules of the Regin espionage platform

Symantec revealed the existence of 49 new modules of the Regin espionage platform, a circumstance that suggests that its operators are still active. In November 2014, security experts at Symantec have uncovered the backdoor Regin, a highly advanced spying tool used in cyber espionage campaigns against governments and infrastructure operators.  The Regin malware has been around […]

Pierluigi Paganini August 26, 2015
Be aware enterprises, it’s time to block Tor network

A research conducted by the IBM X-Force team reveals that a growing number of cyber attacks against big IT enterprises relies on the Tor network. With the increase of Tor-based attacks, something needs to change, and IBM is advising companies to start blocking Tor. A research conducted by the IBM X-Force team reveals that SQL […]

Pierluigi Paganini August 26, 2015
Sphinx, a new variant of Zeus available for sale in the underground

A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market, it operates entirely through the Tor network. A few days ago a new variant of the popular Zeus banking trojan was offered for sale on the black market, its name is Sphinx. Sphinx code is […]

Pierluigi Paganini August 26, 2015
SysAdmin admin tool AutoIt used in targeted attacks to serve malware

Security experts at Cisco have uncovered a targeted attack leveraging on AutoIt to serve a RAT and other malware by evading detection. Security experts at Cisco uncovered a targeted hacking campaign that leveraged AutoIt to spread RAT and other malware via Word documents. The RATs were used to compromise computer of a small number of organizations. “AutoIt […]

Pierluigi Paganini August 21, 2015
Blue Termite APT group focuses on Japanese organizations

Security experts at Kaspersky Lab have analyzed the cyber attacks run by the Blue Termite APT, a hacking crew group focused on Japanese organizations. According to the experts at Kaspersky security firm, an ATP group dubbed Blue Termite has been active since at least November 2013 focusing its attacks on Japanese organizations. The Blue Termite APT […]

Pierluigi Paganini August 18, 2015
Hidden Tear Ransomware is now open Source and available on GitHub

The Turkish security researchers Utku Sen has published the first open source ransomware  for educational purposes that anyone can use. Ransomware is now open Source and available in GitHub. Ransomware is one of most dangerous cyber threats for end-users, in the recent months the number of ransomware in the wild is increased as never before. Criminal […]