Malware

Pierluigi Paganini June 26, 2016
Locky Ransomware is back! 49 domains compromised!

Locky ransomware starts up again its illegal activity of stealing money from their victims after a temporary inactivity since the end of May. This time, it comes with hard-coded javascript A new Locky campaign appears in the wild with, experts observed million malicious email messages starting from June 20. Researchers at Proofpoint observed that this […]

Pierluigi Paganini June 22, 2016
Pawost Android Malware uses Google Talk to make unwanted phone calls

Researchers at MalwareBytes have spotted a new Android Malware dubbed Pawost that uses Google Talk to make unwanted phone calls. Security experts from MalwareBytes have spotted a new strain of Android malware, dubbed Android/Trojan.Pawost, that implements an unusual feature. The Pawost threat originates from China and is able to use Google Talk to make malicious phone […]

Pierluigi Paganini June 22, 2016
Conficker, the malware with the most wide spread diffusion

Conficker (also known as Downup, Downadup e Kido) is one of the oldest and still active malware, according to Check Point researchers it is  “the most prominent family accounting for 14 percent of recognized attacks.” Conficker is technically a worm that leverages a vulnerability in the Windows Server Service to spread itself, it targets an […]

Pierluigi Paganini June 21, 2016
Exploit kit traffic drops by 96% since April, what is happening?

The exploit kit landscape is rapidly changing,the Angler and Nuclear EK disappeared and overall malicious traffic drops by 96% since April. As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs represent a serious threat to online […]

Pierluigi Paganini June 15, 2016
ScarCruft APT Group exploited Flash Zero-Day in High-Profile attacks

Security experts from Kaspersky Lab revealed that an APT group dubbed ScarCruft exploited the zero day vulnerability (CVE-2016-4171) in Adobe Flash Player. According to the experts from Kaspersky Lab, an APT group dubbed ScarCruft exploited a zero day vulnerability (CVE-2016-4171) in Adobe Flash Player. The group launched a series of attacks against high-profile targets against entities in […]

Pierluigi Paganini June 14, 2016
Watch out, FLocker Ransomware targets Android smart TVs

The day has come, Sharp and Philips smart TV running the Android TV OS could be infected by a ransomware dubbed FLocker ransomware. When a journalist asked me which is a possible evolution of ransomware I had no doubt, the Internet of Things. I was thinking of ransomware that infects medical devices and Smart objects in our homes. […]

Pierluigi Paganini June 11, 2016
How to recover files encrypted by all Teslacrypt Ransomware variants

Experts from Cisco Talos team have improved their decryptor tool to allow the recovery of files encrypted by all the Teslacrypt Ransomware variants In May, criminals behind the TeslaCrypt ransomware leaked online the master encryption key that allowed security experts to develop a decryption tool for the last variant of the threat. “In surprising end to TeslaCrypt, […]

Pierluigi Paganini June 11, 2016
Bolek Banking Trojan, a Carberp Successor is spreading in the wild

The Bolek banking Trojan is one of the successors of the notorious Carberp Trojan that targets both 32-bit and 64-bit Windows systems. When the source code of the Carberp Trojan was leaked online, numerous threat actors developed their own variants. This process allowed a significant evolution of the malware that increased its sophistication across the time. […]

Pierluigi Paganini June 10, 2016
Necurs Botnet, one of the world’s largest malicious architecture has vanished

The Necurs Botnet, one of the world’s largest malicious architecture, used to spread the dreaded threats appears to have vanished since June 1. In the last months, we have read a lot of news regarding the activities on one of the largest botnet in the wild that was used by crooks to deliver the Dridex […]

Pierluigi Paganini June 10, 2016
CRYPTXXX campaigns, threat actors switch to Neutrino EK

Security experts from the SANS observed that new CryptXXX ransomware campaigns are leveraging on the Neutrino Exploit Kit instead the Angler Exploit Kit. Crooks behind the CryptXXX ransomware have launched a new campaign leveraging on the Neutrino Exploit Kit instead the Angler Exploit Kit. It was a significant change in the attack chain that was discovered by the experts […]