underground

Pierluigi Paganini August 26, 2015
Sphinx, a new variant of Zeus available for sale in the underground

A new variant of the popular Zeus banking trojan dubbed was Sphinx is appeared for sale on the black market, it operates entirely through the Tor network. A few days ago a new variant of the popular Zeus banking trojan was offered for sale on the black market, its name is Sphinx. Sphinx code is […]

Pierluigi Paganini August 12, 2015
Facebook API flaw Left 1.44 Billion Users’ Identities at risk

A security flaw in the Facebook API allows hackers to decrypt and scan user IDs, nearly 1.44 billion Facebook users are at risk of identity theft. The security researcher Reza Moaiandin, Technical Director at Salt Agency, discovered a flaw in Facebook’s API that can allow hackers to scan for user ID, and that leaves about […]

Pierluigi Paganini July 16, 2015
A former intern at FireEye accused for Dendroid RAT developing

A former intern at FireEye firm has been arrested for developing and distributing the sophisticated Android malware dubbed Dendroid. A former intern at FireEye firm has been arrested for developing and distributing the sophisticated Android malware dubbed Dendroid.  Experts at Symantec in March 2014 discovered a new HTTP Android Remote administration tool, named Dendroid, available on […]

Pierluigi Paganini July 04, 2015
Lordfenix: 20-year-old Brazilian has written 100 banking trojan

Trend Micro has identified Lordfenix, a student that created more than 100 different banking Trojans and other malicious tools, since April 2013. Security experts at Trend Micro have identified a 20-year-old Brazilian student which has developed and distributed more than 100 Banking malware. The young cyber criminal, which used the pseudonym of ‘Lordfenix’, ‘Hacker’s Son’ and […]

Pierluigi Paganini June 29, 2015
Experts found Government Credentials on the Open Web too easily

Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on several paste sites. According to analysts at Recorded Future, the credentials stolen in several data breached related to 100 US government domains are available online on a number of paste sites and on other websites. […]

Pierluigi Paganini June 27, 2015
SCADA systems available for sale in the Underground

Security experts have discovered the availability in underground forums of the credentials and other information related to SCADA systems. SCADA (Supervisory Control and Data Acquisitions) systems are the most important components for the control of processes inside a critical infrastructure. A recent report published by Dell revealed a 100 percent increase in the number of attacks on […]

Pierluigi Paganini June 07, 2015
A quick tour in the hacking black market

A quick tour in the Black Markets, the places on the web where it is possible to acquire or rent “malicious” services and illegal products. Black Markets are places on the web where it is possible to acquire or rent “malicious” services and products, these markets are growing fast and are becoming very popular in […]

Pierluigi Paganini May 10, 2015
Hiring hackers, how much is it?

In recent years the perception of the role of hackers is completely changed, in the past these high-skilled professionals were viewed as dangerous threats that needed to be kept at arm’s length, meanwhile today they are highly sought from private companies and intelligence agencies. “An increasingly large number of modern business operations rely on an understanding of the […]

Pierluigi Paganini April 23, 2015
Phasebot, the fileless malware sold in the underground

Security experts at Trend Micro have discovered Phasebot malware, which also has fileless infection as part of its routine, is being sold online. Phasebot  is a strain of malware characterized by fileless infection that is being sold in the criminal underground. In August 2014, experts at GData discovered Poweliks, a persistent malware able to infect machines without installing […]

Pierluigi Paganini April 12, 2015
How far do stolen data get in the deep web after a breach?

A group of experts at Bitglass used watermarks to track data through the Deep Web and discover how far does it get after a data breach. Early detection of a data breach is crucial to limit the data exposure, unfortunately sometimes they are necessary many months before a breach is detected by security experts. To […]