Cyber Crime

Pierluigi Paganini September 07, 2015
Chinese law enforcement arrested 15,000 for cybercrime under the op “Cleaning the Internet”

The Government of Beijing has arrested nearly 15,000 people involved in cybercrime as part of the operation “Cleaning the Internet.” The Chinese authorities have arrested nearly 15,000 people involved in criminal activities online as part of the operation against the cybercrime is dubbed “Cleaning the Internet.” The Chinese Government accused the suspect to have “jeopardized Internet security.” According […]

Pierluigi Paganini September 07, 2015
Ashley Madison Users victims of extortion and phishing

Security researchers have observed a spike in extortion attempts and phishing campaigns against the Ashley Madison users … are they effective? The hack of the Ashley Madison website has demonstrated us how much dangerous could be a cyber attack against a website that manage sensitive and confidential information of millions users. The disclosure of the Ashley Madison dump has […]

Pierluigi Paganini September 06, 2015
DoJ defines new rules for spying with the Stingray technology

The US Justice Department issued guidelines for StingRay Surveillance devices, new rules define aim to ensure privacy protection and transparency. Do you know what is a StingRay? If you want further details give a look to a post I wrote for the Infosec Institute on the StingRay Technology: “StingRay is an IMSI-catcher (International Mobile Subscriber […]

Pierluigi Paganini September 06, 2015
Carbanak trojan reloaded! A new variant spotted in the wild

The CSIS Security Group has spotted a new version of the notorious Carbanak Trojan in the wild targeting financial organizations in Europe and US. Do you remember the Carbanak gang? In February, researchers from Kaspersky discovered that a multinational gang of hackers dubbed Carbanak that swiped 1 Billion dollars from 100 financial institutions across 30 countries, most of the […]

Pierluigi Paganini September 05, 2015
Mozilla Bugzilla accessed, private flaws compromised since at least 2014

Mozilla said that data stolen from its bug tracking system was used to attack Firefox users in the wild, but attackers probably have had access since 2013. A threat actor that stole sensitive vulnerability information from the Mozilla’s Bugzilla bug tracking system last year has likely used it to target Firefox users. Mozilla explained that it did […]

Pierluigi Paganini September 05, 2015
Fake recruiters on LinkedIn spy on security experts

Security researchers have uncovered a group of fake recruiting accounts on LinkedIn used for intelligence gathering about security experts. A group of fake recruiter accounts is abusing the LinkedIn professional social network to send invitations to security professionals in various industries. The fake recruiters attempt to deceive targets usually by using a LinkedIn profile with […]

Pierluigi Paganini September 04, 2015
Barclays creates its own red team to attack its systems to find flaws

Barclays has created a red team to hack its own computer systems to discover and exploit security vulnerabilities before external attacker do. For someone working in the security area, it’s known that many companies have red teams to attack their own system, but this information is never recognized by the company. Barclays did exactly the […]

Pierluigi Paganini September 04, 2015
Match com, millions online daters at risk due to a malvertising campaign

Malwarebytes has uncovered a new malvertising campaign targeting the Match.com ‘s ad network which has been breached by a malware campaign. Are you a UK single looking for love and passion? Be aware another threat is menacing dating communities, this time the popular dating web site Match.com and its  5.5 million British users suffered a […]

Pierluigi Paganini September 04, 2015
New singular Android Ransomware relies on the XMPP protocol

A new variant of Android ransomware relies on the instant messaging protocol XMPP to establish a communication with C&C servers. According to security researchers at Check Point Software Technologies a new Android ransomware disguised as a video player app implements a method of communication different from any other similar threat. This Android ransomware is different from […]

Pierluigi Paganini September 03, 2015
Dark Web intelligence pro and cons

Dark Web Intelligence could help law enforcement and intelligence agencies to gather information on potential attacks. Which are the risks? The increased number of cyber attacks against government entities and the hypothesis that the U.S. government should take an offensive strike against hackers who hit the countries raised the discussion on the problem of the attribution. Prevention, mitigation and […]