underground

Pierluigi Paganini June 12, 2014
Gmail hacking, a mine of data for phishing and spam attacks

An Israeli researcher disclosed a Gmail vulnerability, fixed by Google, that exposes an indefinite number of Gmail addresses and business emails. Google company has fixed a critical vulnerability, disclosed by the Israeli researcher Oren Hafif,  that exposes an indefinite number of Gmail addresses. Technically the experts has discovered that it is possible to bruteforce a token […]

Pierluigi Paganini June 11, 2014
Pandemiya is a written-from-scratch trojan being sold in the underground

RSA Security’s FraudAction team released a report on Pandemiya, a new banking Trojan being sold in hacker forums as an alternative to the popular Zeus. RSA Security’s FraudAction team issued a report on Pandemiya, a banking Trojan being proposed in the underground ecosystem as the most effective alternative to the Zeus banking Trojan. Pandemiya Trojan is being sold for as […]

Pierluigi Paganini May 22, 2014
Chip-and-PIN cards easily cloning with the pre-play attack

A team of British researchers discovered a series of security flaw, Pre-Play Vulnerability, which allow Chip-and-PIN Payment Card Cloning. The recent incident to the US giant retailers Target and Neiman Marcus has raised the debate on the real level of security of credit/debit cards used by US citizens, in response VISA and Mastercard are accelerating the migration […]

Pierluigi Paganini April 28, 2014
FakeInst – Kaspersky discovered the first active Android SMS trojan

Kaspersky Lab has recently detected FakeInst, the first active SMS trojan for Android which targeted users in 66 countries, including the US. Security experts at Kaspersky Lab have recently detected the first active SMS trojan for Android, which send short messages to premium-rate numbers in 14 countries around the world. The malware, dubbed ‘Trojan-SMS.AndroidOS.FakeInst.ef‘ (aka FakeInst) mainly infected mobile […]

Pierluigi Paganini April 22, 2014
Grams, the search engine for the black markets

It has been officially announced the launch of the beta version of Grams Darknet Market Search Engine specialized for researches in the underground markets. All my readers know my involvement in the researches conducted on Tor Network, and more in general on the Deep Web. Recently, many events have shocked the Tor community, the revelation […]

Pierluigi Paganini April 21, 2014
The novelties inside the last critical update for P2P Zeus

Which are the security improvements in the critical update proposed by criminal ecosystem for P2P Zeus Botnet? Fortinet experts detected and analyzed it. Security experts at Fortinet have uncovered a critical update proposed by criminal ecosystem for P2P Zeus Botnet. The first P2P Zeus variant was uncovered by Trusteer firm a couple of years ago, it was used […]

Pierluigi Paganini April 07, 2014
Windows XP deadline and security concerns

The end of support for Windows XP OS is at hand, the consequences could be serious for specific industries and in counties where the OS is dominant. Timing is running out for Windows XP because the end of support is very close, tomorrow, April 8th 2014, the support for the popular OS will end. After 12 years, support for Windows […]

Pierluigi Paganini April 04, 2014
Android Oldboot B, the most dangerous and complex bootkit of ever

Chinese researchers from “360 Mobile Security” detected Android Oldboot.B malware, until today the most complex bootkit which infected millions of devices. A new sophisticated Android Bootkit has been detected by Chinese Security Researchers from “360 Mobile Security“, its name is Oldboot.B and appears as an evolution of its predecessor Oldboot.A. According the researchers Oldboot.B could be considerable as […]

Pierluigi Paganini March 29, 2014
Reading the Global Threat Intelligence Report (GTIR)

The Global Threat Intelligence Report (GTIR) addresses the security challenges of organizations globally analyzing 3 billion worldwide attacks occurred in 2013. The NTT Innovation Institute has released the new Global Threat Intelligence Report (GTIR), a document structured to raise awareness of the rapidly evolving global threat landscape. The GTIR was based on threat intelligence and attack data from […]

Pierluigi Paganini March 22, 2014
New variant of Zorenium Bot can infect iOS devices

Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to infect also iOS devices. Security analysts at SenceCy are monitoring the evolution for the Zorenium Bot, a new and unknown malware which has been advertised in the underground since January 2014. This is the third […]