HackDig : Dig high-quality web security articles for hacker

Dridex Launches Dyre-Like Attacks in UK, Intensifies Focus on Business Accounts

IBM X-Force researchers have been following new developments in the Dridex Trojan’s attack methodologies. In their latest alert, researchers divulged a new modus operandi launched by Evil Corp, the cybercrime group that owns and operates the Dridex banking Trojan. Dridex Learns From Dyre Dridex recently released a new malware build with some internal b
Publish At:2016-01-19 16:25 | Read:4758 | Comments:0 | Tags:Advanced Threats IBM X-Force Malware Threat Intelligence Ban

2016 Cybercrime Reloaded: Our Predictions for the Year Ahead

A Look Back at Cybercrime in 2015 Cybercrime in the past 12 months has been nothing short of epic. Never before have we borne witness to the magnitude or sophistication of online crime as we did in 2015. In the 2015 Cost of Data Breach Study by IBM and the Ponemon Institute, the average total cost of a data breach increased from $3.52 million in 2014 to $3.7
Publish At:2016-01-15 22:00 | Read:4668 | Comments:0 | Tags:IBM X-Force Threat Intelligence Cybercrime Dark Web IBM X-Fo

Konnichiwa, Rovnix! Aggressive Malware Hits Japanese Banks

IBM X-Force researchers have discovered that the cybercrime gang operating the Rovnix Trojan has launched an aggressive new infection campaign in Japan. Rovnix is the latest advanced malware to set its sights on Japan. Before it came the Shifu Trojan, which initiated attacks in Japan in August 2015. The gang that operates Rovnix is known to focus on European
Publish At:2016-01-08 09:10 | Read:4033 | Comments:0 | Tags:IBM X-Force Threat Intelligence Vulns / Threats Advanced Thr

Attackers Shift Sights From Retail to Health Care in 2015

During the holiday season just a few years ago, major retailers were in a panic responding to countless attacks from cybercriminals targeting their highly coveted customer credit card information. It’s likely that you were personally impacted by those high-profile breaches, or if not, you know someone close to you who was. IBM’s X-Force security
Publish At:2015-12-25 01:35 | Read:3759 | Comments:0 | Tags:Health Care IBM X-Force Retail Cybercrime Data Breach Health

The Return of Ramnit: Life After a Law Enforcement Takedown

Organized cybercrime is known to attract the attention of international law enforcement and regional counter-cybercrime task forces. Botnet takedowns are one of the means by which police forces from around the world coordinate the disruption of digital crime. Cases of botnet takedowns date back to a variety of spam zombie networks like Pushdo, Rustock, Grum
Publish At:2015-12-22 19:20 | Read:4228 | Comments:0 | Tags:Banking & Financial Services IBM X-Force Malware Banking Tro

The Retail Industry’s Top Cyberthreat in 2015? Malware

What’s the retail industry receiving this holiday season? Most likely a new malicious link or document. A new IBM report revealed that attacks involving malware are prevalent, making up most of the threat activity observed across the IBM Managed Security Services client networks. Malware is the leading attack type in breaches, according to IBM X-Force
Publish At:2015-12-16 00:35 | Read:4337 | Comments:0 | Tags:IBM X-Force Retail Cybersecurity Data Breach IBM X-Force Sec

The Ripple Effect of the CISO in the C-Suite

War games aren’t just for movies. In fact, they have a place in every business, up through the C-suite. When our experts from IBM Emergency Response Services (ERS) reported on the top developments they’d seen in 2015 engagements in the recent IBM X-Force Threat Intelligence Quarterly, the rise in prominence of the CISO role and the prevalence of
Publish At:2015-12-07 17:40 | Read:2741 | Comments:0 | Tags:CISO IBM X-Force C-Suite Chief Information Security Officer

A Kitten and an Information Security Analyst Walk Into a Bar…

So a kitten and an information security analyst walk into a bar… It’s a great setup for a joke, right? (Unless you consider that kittens are way too young to drink and shouldn’t even be in a bar in the first place.) Let us also consider that an information security analyst probably doesn’t have the luxury of time to go to a bar given
Publish At:2015-11-23 10:05 | Read:3475 | Comments:0 | Tags:IBM X-Force IBM X-Force Security Research Information Securi

The InfoSecond, Nov. 16–20: Hacking Contests and Millennials, 2015 Security Lessons and More!

A new week means a brand new InfoSecond! Get top insights and lessons learned from expert security researchers during 2015, discover how ethical hacking competitions can attract millennials to cybersecurity, learn what features should be included in travel security programs for the enterprise, and find out which day of the week malware distribution peaks – a
Publish At:2015-11-22 16:00 | Read:2873 | Comments:0 | Tags:Malware Security Intelligence & Analytics Cybercrime Hacking

A Look Back With IBM X-Force: Lessons Learned From Security Research in 2015

This year has flown by! It seems like just yesterday IBM was presenting “2014: The Year That the Internet Fell Apart” at the InterConnect Conference. Aside from good holiday cheer, the end of the year is often a time when one reflects on past events and lessons learned. For this reason, the final issue of the 2015 IBM X-Force Threat Intelligence
Publish At:2015-11-17 09:30 | Read:2712 | Comments:0 | Tags:IBM X-Force IBM X-Force Security Research Indicators of Comp

Comparing Different Tools for Threat Sharing

The Importance of Threat Intelligence Collecting threat intelligence data and determining how to process this data is getting more and more attention from security professionals who want to detect and quickly respond to security threats. This holds true not only for advanced persistent threats (APTs), but also for mainstream attacks. Threat sharing provides
Publish At:2015-10-07 14:05 | Read:4062 | Comments:0 | Tags:IBM X-Force Threat Intelligence Advanced Persistent Threat (

UK Banks Hit With New Zeus Sphinx Variant and Renewed Kronos Banking Trojan Attacks

Two recent discoveries by IBM Security X-Force researchers indicate that the U.K. is seeing an increased wave of banking Trojan attacks from two families linked with the Zeus Trojan: Sphinx and Kronos. In the first case, X-Force researchers are the first to confirm that beyond seeing underground posts of cybercriminals selling a new Zeus variant dubbed Sphin
Publish At:2015-10-02 08:05 | Read:4286 | Comments:0 | Tags:IBM X-Force Malware Banking Trojan crimeware Cybercrime IBM

An Overnight Sensation — CoreBot Returns as a Full-Fledged Financial Malware

Co-authored by Martin Korman Just last month, Security Intelligence warned about a new and modular Trojan called CoreBot, indicating its internal structure suggested a new threat about to evolve. CoreBot’s developers did not wait long. Within a matter of days, new samples of CoreBot, discovered and analyzed by IBM X-Force researchers, revealed that the
Publish At:2015-09-11 00:05 | Read:4798 | Comments:0 | Tags:IBM X-Force Malware Risk Management Threat Intelligence Adva

Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity

The fraud underground is a vivid dark market replete with services, commodities and information sharing, providing cybercriminals with just about any help they may need for their misdoings. Alongside the usual malware vendors and fraud scam chatter, one recent phenomenon IBM Security X-Force researchers have been tracking is certificates-as-a-service (CaaS).
Publish At:2015-09-09 12:55 | Read:3714 | Comments:0 | Tags:IBM X-Force Threat Intelligence Certificate Authority (CA) C

An Example of Common String and Payload Obfuscation Techniques in Malware

I’ve recently investigated malware that we received from a customer. The SHA-256 is: f4d9660502220c22e367e084c7f5647c21ad4821d8c41ce68e1ac89975175051. This is not particularly complex malware from a technical point of view, but it illustrates some of the most common techniques used by malware authors to complicate dynamic (automated) and static (manual
Publish At:2015-09-05 03:20 | Read:3690 | Comments:0 | Tags:IBM X-Force Malware IBM X-Force Security Research Security R


Share high-quality web security related articles with you:)


Tag Cloud