Cyber Crime

Pierluigi Paganini February 26, 2018
Data Keeper Ransomware – An unusual and complex Ransom-as-a-Service platform

The Data Keeper Ransomware that infected systems in the wild was generated by a new Ransomware-as-a-Service (RaaS) service that appeared in the underground recently. A few days ago a new Ransomware-as-a-Service (RaaS) service appeared in the underground, now samples of the malware, dubbed Data Keeper Ransomware, generated with the platforms are have already been spotted in […]

Pierluigi Paganini February 25, 2018
Counterfeit Code-Signing certificates even more popular, but still too expensive

Code-signing certificates are precious commodities in the criminal underground, they are used by vxers to sign malware code to evade detection. Other precious commodities in the criminal underground are code-signing certificates, they allow vxers to sign the code for malware to evade detection. Operators of the major black markets in the darknets buy and sell code-signing certificates, but according to […]

Pierluigi Paganini February 25, 2018
Czech President wants Russian hacker Yevgeni Nikulin extradited to Russia instead of US

Czech President Milos Zeman wants the Russian hacker Yevgeni Nikulin to be extradited to Russia instead of the US, he is charged with hacking against social networks and frauds. Yevgeni Nikulin (29) was requested by the US for alleged cyber attacks on social networks and by the Russian authorities that charged him with frauds. According […]

Pierluigi Paganini February 24, 2018
2,000 Computers at Colorado DOT were infected with the SamSam Ransomware

SamSam Ransomware hit the Colorado DOT, The Department of Transportation Agency Shuts Down 2,000 Computers after the infection. SamSam ransomware made the headlines again, this time it infected over 2,000 computers at the Colorado Department of Transportation (DOT). The DOT has shut down the infected workstations and is currently working with security firm McAfee to restore the ordinary […]

Pierluigi Paganini February 24, 2018
FBI warns of spike in phishing campaigns to gather W-2 information

The FBI is warning of a spike in phishing campaigns aimed to steal W-2 information from payroll personnel during the IRS’s tax filing season. The FBI has observed a significant increase since January of complaints of compromised or spoofed emails involving W-2 information. “Beginning in January 2017, IRS’s Online Fraud Detection & Prevention (OFDP), which monitors for […]

Pierluigi Paganini February 23, 2018
Chaos backdoor, a malicious code that returns from the past targets Linux servers

Security experts from GoSecure, hackers are launching SSH brute-force attacks on poorly secured Linux servers to deploy a backdoor dubbed Chaos backdoor. “This post describes a backdoor that spawns a fully encrypted and integrity checked reverse shell that was found in our SSH honeypot,” states the report published by GoSecure. “We named the backdoor ‘Chaos’, following the name […]

Pierluigi Paganini February 23, 2018
OMG botnet, the first Mirai variant that sets up proxy servers on vulnerable devices

Researchers at Fortinet have discovered the OMG botnet, the first Mirai variant that sets up proxy servers on the compromised IoT devices. A new variant of the infamous Mirai botnet appeared in the threat landscape, it was discovered by researchers at Fortinet that referred it as OMG because of strings containing “OOMGA” in the configuration table. […]

Pierluigi Paganini February 22, 2018
Hackers compromised a Tesla Internal Servers with a Cryptocurrency miner

Cloud security firm RedLock discovered that hackers have compromised the Tesla cloud computing platform to mine cryptocurrency. Tesla has confirmed that hackers have compromised its cloud computing platform to mine cryptocurrency, after the incident was discovered by cloud security firm RedLock. The hackers have breached the Tesla cloud servers and have installed a crypto currency […]

Pierluigi Paganini February 22, 2018
The Global cost of cybercrime jumped up to $600 Billion

The tech giants McAfee and Cisco published to reports that providers further info about the global impact of cybercrime. Which is the cost of cybercrime? It is hard to provide an effective a good estimation of the overall impact of the numerous phenomena that happen every day, including cyber attacks, data breaches, scams and so on. The tech […]

Pierluigi Paganini February 20, 2018
Coldroot RAT cross-platform malware targets MacOS without being detected

The former NSA hacker and malware researcher Patrick Wardle is back, this time he spotted a new remote access Trojan dubbed Coldroot RAT. The Coldroot RAT is a cross-platform that is targeting MacOS systems and the bad news is that AV software is not able to detect it. The malware acts as a keylogger on MacOS systems prior to […]