Trojan

Pierluigi Paganini May 29, 2013
Two-factor authentication, necessary but not sufficient to be safe

Adoption of a two-factor authentication process is necessary  to increase the robustness for authentication processes, but security is a process that must be cured at 360 degrees. Twitter finally deployed two-factor authentication to improve security of a user’s account, this is the response of popular social network to the various incidents occurred to some of […]

Pierluigi Paganini March 25, 2013
Multiplatform Wiper widespread in attacks against South Korea

Recently South Korea has been hit by powerful cyber attack malware based, network provided by LG UPlus Corp was hacked by a group calling itself the “Whois Team”. The attack targeted also media and banking of the country, television networks YTN, MBC and KBS and Shinhan Bank and NongHyup Bank, two major banks of the […]

Pierluigi Paganini February 23, 2013
What does the Poetry with Citadel trojan?

Recently I published an article on the attacks against Japanese banks using a new variant of the popular Zeus, one of the most prolific malware of recent history, security experts in fact have detected various versions of the popular malicious code that hit also mobile and social networking platforms. Due its flexibility the malware has […]

Pierluigi Paganini December 17, 2012
Group-IB: Banking trojan «Carberp» sales were reborn with bootkit module

During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system named the CyberCop. It was for me the opportunity to receive many interesting […]

Pierluigi Paganini September 13, 2012
Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that cyber criminal activities are mainly located in some area of the planet, as we can see also the victims of the attacks have a geographical features that make them attractive targets. Factors such as the […]

Pierluigi Paganini September 09, 2012
Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and indirect effects of the several cyber espionage campaigns discovered such as Flame and Gauss, but we never approached the problem in future projection examining the possible impacts of an incident many years after it. Symantec […]

Pierluigi Paganini August 07, 2012
DaVinci code,the surveillance business & eligibility of investigations

No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily news regarding new unknown agents developed by cybercriminals, governments or hacktivists, but are we really ready to reduce the exposure of our resources? Some weeks ago a news has passed without  too much noise but […]

Pierluigi Paganini July 25, 2012
Japan institutions victim of cyber espionage, is it cyber warfare?

One of the biggest cyber threat is cyber espionage, it’s the sign of the technological era in which every devices surround has an intelligence component that could be exploited. Governments first, cyber criminal after, have discovered the great efficiency of malware used to steal sensible information to the victims, no matter if we are speaking […]

Pierluigi Paganini July 21, 2012
Kindsight Security report on the growth of malware diffusion

Today I had the opportunity to analyze the a majority-owned subsidiary of Alcatel-Lucent, that shows a worrying scenario, around 14 percent of home networks were infected with malware in the period between  April and June 2012. Researchers declared: “We saw an increase in the number of home networks infected as compared to first quarter 2012,” One […]

Pierluigi Paganini July 04, 2012
Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber criminal project. Few months ago I wrote on the excellent customer relationship management (CRM) model implemented by its creators. Thanks a malware evolution dictated by market needs, the trojan has evolved in time, many instances […]