HackDig : Dig high-quality web security articles

Google removed almost 300 Android apps involved in DDoS attack

Google removed almost 300 Android apps from the official Play Store after expert at ESET reported they were abused for a DDoS attack. This week Google has removed at least 300 apps from the Official Play Store after learning that apps were being hijacked to power DDoS attacks. “We identified approximately 300 apps associated with the issue, blocked them from
Publish At:2017-09-03 18:25 | Read:4776 | Comments:0 | Tags:Breaking News Hacking Malware Mobile Android botnet DDoS Ese

“Cyber-crime is international, but we get stuck with national laws that may not be compatible in this fight”

Our guest article Righard has been in the IT security world since the late 80’s, and “playing” with computers since the 70’s. 1- At the beginning, computer viruses were almost like a myth. However, over the years, computer attacks became real and they have evolved significantly, along with security solutions. To what extent are we doing things p
Publish At:2016-12-02 16:35 | Read:5879 | Comments:0 | Tags:Mobile News Panda Security cybersecurity eset guest article

Nemucod Downloader Returns, Spreads Ad-Clicking Backdoor

Researchers are warning Nemucod – one of the most active Trojans this year – has resurfaced with a new campaign. This time, the malicious downloader appears to be infecting victims with an ad-clicking backdoor.According to security researchers at ESET, the backdoor Trojan, called Kovter, allows the attacker to remotely control the machine without the user’s
Publish At:2016-08-12 16:35 | Read:5144 | Comments:0 | Tags:Latest Security News ESET malware Nemucod ransomware

What makes a good CISO?

What makes a good CISO? Posted by David Harley on July 9, 2016.The role of the CISO is a little different to the stuff I usually post here, but my ESET colleague Stephen Cobb is currently running a research project, ‘a study of what it takes to be an effective manager of informat
Publish At:2016-07-09 21:10 | Read:6804 | Comments:0 | Tags:David Harley CISO ESET Stephen Cobb system security

Espionage SBDH Toolkit used to target European Countries

ESET security firm has uncovered an espionage toolkit dubbed SBDH that was used in espionage campaigns targeting government organizations in Europe. Security experts from ESET security firm have spotted an espionage toolkit dubbed SBDH that was used by threat actors in hacking operations targeting government organizations in Europe. The research observed inf
Publish At:2016-07-06 10:20 | Read:5771 | Comments:0 | Tags:Breaking News Cyber Crime Malware cyber espionage Eset malwa

Stuxnet: more historical than hysterical, I hope

Stuxnet: more historical than hysterical, I hope Posted by David Harley on June 7, 2016.I don’t make a habit of using this blog to advertise another, but the article I’m going to talk about is just too long to rewrite for this blog. And in fact, I’m not generally a fa
Publish At:2016-06-07 22:05 | Read:5313 | Comments:0 | Tags:David Harley 0-day certifications ESET ICS Iraqi printer vir

TeslaCrypt: We’re Sorry, Here’s the Decryption Key

TeslaCrypt: We’re Sorry, Here’s the Decryption Key Posted by David Harley on May 19, 2016.Are the TeslaCrypt operators genuinely apologizing? Probably not, since it seems that they’ve moved on to CryptXXX rather than retiring to a monastery to flagellate themselves wi
Publish At:2016-05-19 20:55 | Read:5232 | Comments:0 | Tags:David Harley BloodDolly CryptXXX ESET ransomware TeslaCrypt

Patches (and Vulnerabilities, and Exploits)

Patches (and Vulnerabilities, and Exploits) Posted by David Harley on April 7, 2016.As Clarence Carter once sang, ‘Patches, I’m depending on you…’I don’t generally use this blog as a means for promoting articles on other sites. However, I recently found m
Publish At:2016-04-07 14:55 | Read:5720 | Comments:0 | Tags:David Harley ESET exploits Heimdal Kevin Townsend patching v

Buzzwords and Booth Bunnies

Buzzwords and Booth Bunnies Posted by David Harley on March 3, 2016.I try to keep my (paid) work for the security industry at arms length from what I write about here, and I certainly don’t go in for product placement. However, I’ve just seen an article by Cameron Camp, my
Publish At:2016-03-04 14:10 | Read:4391 | Comments:0 | Tags:David Harley Cameron Camp conferences ESET RSA trade shows

BlackEnergy Attacking Ukraine’s Critical Infrastructures

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014 (see our previous blog posts on Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland and BlackEnergy PowerPoint Campaigns, as well as ourVirus Bulletin talk on the subject), was also active in the year 2015. ESET has r
Publish At:2016-01-10 19:25 | Read:10698 | Comments:0 | Tags:Cyber Security Cyber Security Research Cyber Warfare ICS SCA

BlackEnergy Malware Caused Ukrainian Power Outage, Confirms Researchers

Researchers have confirmed that a variant of the BlackEnergy malware was behind a power outage that occurred around Christmas Eve last year.Reuters reports that the Western Ukrainian power company Prykarpattyaoblenergo reported on outage on December 23rd that affected an area including the regional capital Ivano-Frankivsk. A subsequent investigation reveale
Publish At:2016-01-05 08:05 | Read:5510 | Comments:0 | Tags:Latest Security News Anton Cherepanov BlackEnergy ESET KillD

Roaming Tiger Hackers targets Russian organizations for espionage

Security researchers from ESET uncovered the Roaming Tiger hacking campaign, bad actors in the wild are targeting Russian organizations. Roaming Tiger is the name of a cyber espionage campaign targeting high profile organizations in Russia and former Soviet Union countries, including Belarus, Kazakhstan, Kyrgyzstan, Tajikistan
Publish At:2015-12-25 20:45 | Read:6352 | Comments:0 | Tags:Cyber Crime Hacking Cyber warfare Breaking News malware Russ

Security wares like Kaspersky AV can make you more vulnerable to attacks

Antivirus applications and other security software are supposed to make users more secure, but a growing body of research shows that in some cases, they can open people to hacks they otherwise wouldn't be vulnerable to.The latest example is antivirus and security software from Kaspersky Lab. Tavis Ormandy, a member of Google's Project Zero vulnerability rese
Publish At:2015-09-24 02:00 | Read:5686 | Comments:0 | Tags:Risk Assessment Technology Lab antivirus ESET exploits FireE

Operation Potao – hackers used a trojanized version of TrueCrypt

ESET issued a report on a cyber espionage campaign dubbed Operation Potao that relied on the diffusion of a trojanized Russian language version of TrueCrypt. Despite TrueCrypt development was mysteriously interrupted last year, the popular open-source encryption tool still represents the ideal choice for individuals that need
Publish At:2015-08-02 12:35 | Read:7774 | Comments:0 | Tags:Breaking News Cyber Crime Security cyber espionage Eset Hack

Linux-based Moose worm turns routers into social network bots

Linux/Moose is a malware family that targets Linux-based consumer routers turning them into social network bots to use for illegal activities. ESET released a study about a new malware known as Moose worm that is compromising devices that have a weak or default credentials. The principal target of the Moose worm are the linux-
Publish At:2015-05-27 22:55 | Read:6222 | Comments:0 | Tags:Breaking News Hacking Malware Reports Security botnet Cyberc


Share high-quality web security related articles with you:)
Tell me why you support me <3