phishing

Pierluigi Paganini February 10, 2015
Volume License Trojan Chanitor targets enterprises

Cisco experts discovered a phishing campaign that is spreading fake Volume License Trojan Chanitor to corporate users and is able to evade sandboxes. A few weeks ago, multiple Cisco Managed Threat Defense (MTD) customers received an email that appeared as sent by the Microsoft Volume Licensing Service Center (VLSC), which contains a link to login to the […]

Pierluigi Paganini February 10, 2015
Phishing campaign is targeting Apple iCloud users to steal financial data

Security experts at Sophos spotted a new phishing campaign targeting iCloud users. The attackers are interested in the victims’ financial data. Sophos security firm reported that threat actors are running phishing campaign against Apple iCloud users to steal financial data. The messages sent by bad actors are tailored to appear as legitimate security alerts issued by Apple. […]

Pierluigi Paganini February 09, 2015
Cybercrime exploits Anthem data breach in Phishing campaigns

Following the Anthem data breach, cyber criminals launched phishing campaigns to harvest customers’ personal information and credentials. A few hours after disclosure of the news of the data breach suffered by the nation’s second largest health insurer Anthem cyber criminals started sending phishing emails related to the cyber attacks. The Anthem incident could potentially impact millions […]

Pierluigi Paganini February 08, 2015
New DYRE banking malware in the wild

The experts at TrendMicro detected a new variant of the DYRE /Dyreza banking malware with new propagation and evasion techniques. Researchers at Trend Micro have identified a new strain of the Dyre (Dyreza) financial malware  (Dyreza), which is targeting a larger number of banks. The new variant of Dyre implements some sophisticated propagation and evasion techniques. According to Trend Micro this […]

Pierluigi Paganini January 27, 2015
AT&T short codes exposes users to phishing scams

Computer programmer Dani Grant revealed that short codes from AT&T are easy to spoof and expose customers to phishing scams. AT&T customers are exposed phishing attacks due to proprietary AT&T’s text protocols. Computer programmer Dani Grant discovered that is quite easy to spoof text messages from AT&T. In this variant of “Phishing” attacks, crooks attempt to trick victims […]

Pierluigi Paganini December 28, 2014
Cybercriminals are exploiting the incident of the AirAsia flight QZ8501

Security experts have collected evidence that cyber criminals are exploiting the incident of the flight QZ8501 for illicit activities. Cybercriminals are exploiting the tragedy of the AirAsia flight QZ8501 to conduct illicit activities. Every event that captures the attention of the media is an opportunity for the cyber criminals that could exploit it to run targeted […]

Pierluigi Paganini November 26, 2014
APT3 Operation Double Tap is targeting recently disclosed Windows vulnerabilities

FireEye discovered that the Group of hackers dubbed APT3 that managed the Op Clandestine Fox is now running a new campaign dubbed Operation Double Tap. Researchers at FireEye have uncovered a new advanced persistent threat crew dubbed APT3, which is using exploits targeting recently disclosed vulnerabilities in Windows. The experts at FireEye believe that APT3 is the same […]

Pierluigi Paganini November 22, 2014
PlayStation Network and Widows Live alleged hacks. Why experts afraid attacks on gaming platforms?

Latest report indicates that the alleged hack on Sony’s PlayStation Network, Windows Live and 2k games studio by Derp Tolling could be a hoax. News going round that Derp Trolling hacked Sony’s PlayStation Network(PSN), Microsoft’s Windows Live and 2k games studio freaked out millions of users, but now security experts says the alleged hack could […]

Pierluigi Paganini November 20, 2014
A deep look into the Brazilian underground cyber-market

Trend Micro has published a new study on black cyber-markets focusing on product and services offered on the Brazilian underground. Trend Micro has published a new interesting report on the underground cyber-markets, this is a third study focused on the Brazilian cyber-underground offer, the previous ones analyzed Russian and Chinese marketplaces. The new study, exactly like […]

Pierluigi Paganini November 10, 2014
Manual phishing attacks are the simplest and most effective hacking technique

A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks are the simplest and most effective method for hijacking users’ email address. Let’s consider that the manual phishing attacks, as suggested by the name, doesn’t use […]