Malware

Pierluigi Paganini September 29, 2015
Shifu banking trojan is officially spreading to the UK

The researchers at Security Intelligence announced that Shifu banking trojan is officially spreading to the UK targeting Banks and Wealth Management Firms. A few weeks ago researchers at Security Intelligence announced the discovery of the sophisticated banking Trojan Shifu, the malicious code has been used to target the customers of more than a dozen Japanese […]

Pierluigi Paganini September 28, 2015
How to use GCAT backdoor with Gmail as a C&C server

The GCAT backdoor is a fully featured backdoor which could be controlled by using Gmail as a Command & Control server with multiple advantages for attackers. Establish a backdoor is one of the main goals for an attacker in order to gain persistence over the targeted machines. There are many hacking tools that allow easily to […]

Pierluigi Paganini September 27, 2015
Cisco released a tool to scan for SYNful_Knock implants

Talos has developed a Python script for customers to scan their own network to identify routers that may have been compromised by the SYNful_Knock hack. A couple of weeks ago I published the news of the SYNful_knock security issue involving CISCO routers. CISCO issued an alert to warn enterprise customers about a spike in attacks in which hackers use […]

Pierluigi Paganini September 25, 2015
GreenDispenser, is the last ATM Malware in the wild

The last threat discovered by security experts at Proofpoint is “GreenDispenser,” a malware that presents many similarities with the Tyupkin malware. The use of malicious code to hack ATM is even more common in the criminal ecosystem, in the past security experts have discovered several strain of malware that was designed with this intent. ATM […]

Pierluigi Paganini September 25, 2015
Lenovo caught with pre-installed tracking application for the third time

Michael Horowitz from Computerworld discovered an application called “Lenovo Customer Feedback Program 64,” which is used to gather customers feedback data. Once, two, three … this is the third time that security experts discover a spyware pre-installed on Lenovo laptops and workstations, and also in this case without the knowledge of its millions of users. […]

Pierluigi Paganini September 18, 2015
Thousands of legitimate WordPress sites are serving malware

Sucuri has noticed a spike in the number of compromised websites as part of a malware campaign which relies on thousands of compromised WordPress sites. According to security experts at Sucuri, threat actors have hijacked thousands of websites running the WordPress CMS to serve malware. The technique is not new, legitimate compromised websites host malicious […]

Pierluigi Paganini September 18, 2015
MWZLesson POS Trojan borrows code from other malware

Security experts at Doctor Web have discovered a new PoS Trojan dubbed MWZLesson that borrows code from other popular malicious software. Security experts at Dr. Web have discovered a new PoS Trojan that was designed by mixing code from other malware. The new PoS Trojan, dubbed Trojan.MWZLesson, was designed reusing the code of other popular malware, including the Dexter PoS […]

Pierluigi Paganini September 17, 2015
The DUKES APT – 7 years of Russian state sponsored hacking

F-Secure has published an interesting report on the cyber espionage operations conducted by the Dukes APT group, which appears linked to the Kremlin. Security researchers at F-Secure have published an interesting report detailing the cyber espionage operation of a Russian APT group, dubbed the Dukes, the experts speculate the group is backed by the Russian government. […]

Pierluigi Paganini September 17, 2015
Operation Iron Tiger, hackers target US Defense Contractors

Experts at Trend Micro uncovered the Operation Iron Tiger, a cyber espionage campaign carried out by Chinese hackers on United States Defense Contractors. Security experts at Trend Micro have uncovered a new targeted attack campaign dubbed Operation Iron Tiger. Threat actors behind the Operation Iron Tiger have stolen trillions of data from defense contractors in […]

Pierluigi Paganini September 16, 2015
Hundreds million potential victims of a new advanced malvertising campaign

Experts at MalwareBytes uncovered a massive malvertising campaign, booby-trapped web ads went undetected for weeks leveraging on the Angler Exploit Kit. In August, threat actors behind a number of major malvertising campaigns began to roll out new tactics to avoid the increasing scrutiny of security firms and law enforcement. Security experts at MalwareBytes revealed that crooks […]