Intelligence

Pierluigi Paganini July 17, 2015
Bogus News mobile App discovered in Hacking Team arsenal

Experts at Trend Micro have discovered a malicious Android App while they were analyzing the package of data stolen from Hacking Team. Experts at Trendmicro analyzing package of data stolen from Hacking Team systems discovered a fake news app that was designed to circumvent filtering in Google Play. The malicious app was downloaded only 50 […]

Pierluigi Paganini July 15, 2015
FBI paid Hacking Team to identify Tor users

Documents leaked online after the Hacking Team data breach revealed that the company supported the FBI in the investigation on Tor users. While the security experts are continuing to analyze the impressive amount of data stolen from the Hacking Team, new revelation are circulating over the Internet. Among the clients of the Italian security firm, there […]

Pierluigi Paganini July 15, 2015
Hacking Team Spyware uses a UEFI BIOS Rootkit to gain persistence

Documents leaked online after the Hacking Team hack revealed that the company used a UEFI BIOS rootkit to gain persistence for its spyware software. The recent data breach suffered by the surveillance firm Hacking Team is shocking the IT security industry, the hackers leaked company emails, source codes and contracts revealing uncomfortable truths. Security experts mainly […]

Pierluigi Paganini July 15, 2015
Hacking Team will be back to business soon

The Hacking Team CEO David Vincenzetti announced that the popular surveillance company will be back to business vert soon, but experts have many doubts. After the embarrassing data breach suffered by the Hacking Team, the surveillance company plans to rebuild the “empire”. The hackers likely haven’t stolen the entire intellectual property of the firm, which […]

Pierluigi Paganini July 14, 2015
Seaduke, another weapon in the Duke arsenal

Security researchers at Symantec have analyzed Seaduke, a sophisticated Trojan used by threat actors behind the “Duke” malware family. Security experts at Symantec security firm have analyzed the Trojan.Seaduke, a malware that was used by the APT group behind the Duke espionage campaigns that targeted numerous government organizations worldwide. The Seaduke has many similarities with other […]

Pierluigi Paganini July 13, 2015
Hacking Team supported Italian Special Operations Group with BGP Routing Hijack

Documents leaked online after the Hacking Team hack revealed how the Italian firm supported the Italian Special Operations Group with BGP Routing Hijack. We are following day by day the evolution of the recent Hacking Team hack, the hackers posted online 400 GB of source code, company emails and documents, a treasure for hackers, cyber spies and […]

Pierluigi Paganini July 12, 2015
Security Affairs newsletter Round 17 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Anonymous India hacked BSNL website and compromised more than 30 Million records Cisco Unified CDM platform open to cyber attacks Argentine finds messenger to shoot after e-vote vuln allegations […]

Pierluigi Paganini July 10, 2015
OPM hack results in 21.5 million people being exposed to an unknown party

After revelations in June about the hack to the US Office of Personnel Management (OPM), now it’s time to clarify and explain the extent of the data breach. After the disclosure in June about the hack to the US Office of Personnel Management (OPM), now was time to clarify and explain the extent of the […]

Pierluigi Paganini July 09, 2015
Hacking Team Zero-Day tied to attacks In Korea and Japan

Security experts at Trend Micro revealed that one of the exploits discovered in the Hacking Team package tied to Attacks In Korea and Japan. Following the recent hack of the popular surveillance firm Hacking Team, the experts started the analysis of the material leaked online by the attackers. The package leaked online include also a number […]

Pierluigi Paganini July 08, 2015
Linux, Apache, MySQL is all that evil XKeyscore needs to control the world

According to new revelations of the popular whistleblower Edward Snowden the powerful spying machine XKEYSCORE runs on Red Hat Enterprise Linux. In August 2013, Edward Snowden revealed the existence if a tool named DNI Presenter that allows the Agency to read the content of stored emails, and it also enables the intelligence analysts to tool collects […]