Cyber Crime

Pierluigi Paganini August 04, 2015
RIG Exploit Kit 3.0 infected over 1.3 Million PC worldwide

Version 3.0 of the RIG exploit kit has been released with new significant improvement. It has already infected more than 1.3 million PC worldwide. Early 2015, part of the source code for the 2.0 version of the RIG exploit kit was leaked online due to a dispute between the main developer and a reseller. According […]

Pierluigi Paganini August 02, 2015
Operation Potao – hackers used a trojanized version of TrueCrypt

ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized Russian language version of TrueCrypt. Despite TrueCrypt development was mysteriously interrupted last year, the popular open-source encryption tool still represents the ideal choice for individuals that need to encrypt their data. Recently ESET published an interesting report […]

Pierluigi Paganini August 02, 2015
Security Affairs newsletter Round 20 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. HORNET, the High-Speed Tor-Like encrypted anonymous network Anonymous’s team GhostSec thwarts Isis terror plots Drone Firing Semi-Automatic Handgun, what’s next? Advertising hijacking made by Invisible rogue mobile apps are […]

Pierluigi Paganini August 01, 2015
Bitdefender Hacked, customer data being sold In the underground

Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. Hackers requested a $15,000 ransomware. Hackers are raising the bar, one of the most popular Antivirus firms BitDefender has been hacked and data belonging to its customer have been leaked online. The data breach highlighted serious security issues in the […]

Pierluigi Paganini August 01, 2015
A variant of the Angler Exploit Kit used to infect PoS Systems

Experts at Trend Micro discovered that cyber criminals are exploiting the popular Angler Exploit kit to find and infect PoS systems. The popular Angler Exploit kit is used by criminal crews to find and infect PoS systems, this is the last disconcerting discovery made by the experts at Trend Micro. The security researcher Anthony Joe […]

Pierluigi Paganini July 31, 2015
APT 29 use Twitter to control its Hammertoss data stealer

Experts at FireEye discovered a new APT group dubbed APT 29 that is exploiting Twitter to mask the activities of their data-stealer malware. Experts at FireEye uncovered a group of alleged Russian hackers, dubbed APT 29, that is exploiting Twitter to mask the activities of their data-stealer malware. The hackers belonging to the APT 29 […]

Pierluigi Paganini July 30, 2015
United Airlines reportedly hacked by same APT that breached OPM, Anthem

United Airlines reportedly hacked by same APT that breached OPM, Anthem. Let’s try to understand why and which are the risks for the US citizens. A Chinese APT group  believed to be responsible for a series of high-profile data breaches that affected the U.S. Office of Personnel Management, the Anthem, and more recently the United Airlines. According the media […]

Pierluigi Paganini July 30, 2015
A part of an unclassified Pentagon email network taken down over suspicious activity

Part of a Pentagon email network taken down over suspicious activity, the US authorities are investigating on the alleged intrusion. New problems for the White House emerges from the cyberspace, a portion of the Department of Defence’s email network has been taken down over suspicious activity. According to Pentagon spokeswoman, the unclassified email network used by […]

Pierluigi Paganini July 29, 2015
Malvertising campaign hits 10 million users in 10 days

Security Firm Cyphort Labs reported that 10 million users may have been infected in ten days by a malvertising and exploit kit campaign. Nick Bilogorskiy, a security researcher at Cyphort  revealed that 10 million users may have been infected in ten days due to a malvertising and exploit kit campaign. According to the expert threat actors […]

Pierluigi Paganini July 29, 2015
Experts discovered a new Google Drive phishing campaign

Experts discovered a new Google Drive phishing campaign in which the threat actors deployed phishing web pages on Google Drive. Once again phishers exploited Google’s reputation running a phishing campaign aimed to steal user Google credentials and access to the multitude services offered by the company. The new phishing campaign was discovered by the security […]