Pierluigi Paganini April 10, 2014
The Extortion is a common practice in the cyber criminal ecosystem

According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the cyber context. Extrotion is becoming a worrying inclination in the cyber criminal ecosystem, the number of targeted attacks that request money in change of a suspension of the hostilities and to give back to the victims […]

Pierluigi Paganini September 04, 2013
Cybercrime – Al Assam Alaikum directly linked to Russian Business Network

Security researcher Ian Malloy has identified a new group of hackers dubbed The Al Assam AlaikumCyber Unit linked to recent discoveries on RBN. Security researcher Ian Malloy has been studying facebook.com for several years, watching as the company released product after product and used the hacker business model of ‘build fast and break things.’  Now, […]

Pierluigi Paganini June 12, 2013
Zeus Evolution.Is RBN really linked to Facebook Zeus variant?

Is RBN (Russian Business Network) really linked to Facebook Zeus variant? Exclusive interview with WhiteHat who has investigated on the malware. RBN or ordinary crime, Zeus is appearing in new forms and using new infection channels but according some security analysts behind new a variant there could be the support of members of dangerous criminal organization RBN. As […]

Pierluigi Paganini January 23, 2013
Russian government wants to strengthen its cyber defense,what’s new?

Russian President Vladimir Putin is considered one of the political figures most attentive to the development of a suitable cyber strategy to protect his countries from cyber attacks. Putin is an intelligent man who has always understood the strategic importance of cyberspace, according many experts he has always invested in the development of cyber capabilities, […]

Pierluigi Paganini January 17, 2013
Red October, RBN and too many questions still unresolved

The recently discovered cyber espionage campaign “Red October” has shocked world wide security community, the principal questions raised are: Who is behind the attacks? How is possible that for so long time the campaign went undetected? Which is the role of AV company in these operations? To try to understand who is behind the attacks […]