Law enforcement dismantled the Simda botnet in an international joint effort that involved also most important private security firms. Another joint operation conducted by law enforcement worldwide and private firms has dismantled the Simda botnet, investigators seized 14 Command and control servers, ten of which located in the Netherlands. Other C&C servers were located found […]
The security Expert Michael Fratello provide us a closer look at the Dridex Trojan following its investigation on the malicious agent. The Dridex Banking Trojan is a part of a family of Trojans classified as “banking trojans“. An article describing the Dridex Trojan and some of its inner-workings were published by TrendMicro in November of 2014. […]
ESET has discovered a new hacking campaign dubbed Operation Buhtrap based on a family of spyware targeting vulnerabilities within the Russian Windows System. Late in 2014 analysts at ESET uncovered CVE-2012-0158, a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library. This particular malicious code can be activated by a […]
A team or researchers sponsored by the US DARPA has developed a new innovative tool to improve the detection of Android malware. The blue team of DARPA (Defense Advanced Research Projects Agency) backed up by Iowa State University researchers are developing a tool that will help with Android malware analysis. The features used by the […]
Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]
According to officials at the Federal Aviation Administration (FAA), hackers earlier this year targeted the Agency network with a malware. It’s official, the network of the Federal Aviation Administration (FAA) was targeted early 2015 by unknown hackers. According to FAA officials, the threat actors used a malware to compromise the infrastructure of the agency. “In early February, the FAA […]
Motherboard published an interesting report on an espionage campaign led by the Syrian Electronic Army (SEA) against the opponents of the Syrian Government. Today I decided to present a very interesting story published by Lorenzo Francesco Bicchierai on Motherboard. It is a story about intelligence activities and how hacking supported them. Let’s start from the […]
The international criminal police organisation Interpol and private researchers discovered a severe flaw in block chain used by virtual currencies. INTERPOL cyber threat researchers, including members of the Kaspersky Lab, have identified a serious vulnerability in the virtual currencies schema. The flaw resides in the ‘block chain’ related to virtual transactions and it could be exploited to […]
Security experts from IBM discovered a very sophisticated malware campaign based on the Dyre Trojan to hack Corporate Bank Accounts. IBM has uncovered an important cyber criminal operation dubbed The Dyre Wolf due to the name of the popular Dyre malware used crooks. The Dyre malware was discovered in the wild by several security firms, […]
Researchers at Trend Micro spotted a 64-bit variant of NewPosThings PoS malware designed to steal payment card and other sensitive data. Researchers at Trend Micro have identified a new strain of the NewPosThings point-of-sale (PoS) malware. The new variant of NewPosThings malware is a 64-bit version of NewPosThings, a point-of-sale (PoS) malware discovered by experts at Arbor Networks in […]