HackDig : Dig high-quality web security articles for hacker

Holiday 2016 financial cyberthreats overview

Introduction Last November we conducted a brief analysis of the threat landscape over the holiday period – from October to December in 2014 and 2015 – to find out if the number of financial cyberattacks during this time differs to that usually seen throughout the year. The retrospective analysis found that the percentage of phishing attacks durin
Publish At:2017-01-11 13:20 | Read:1262 | Comments:0 | Tags:Analysis Featured Publications Electronic Payments Financial

Kaspersky Lab Black Friday Threat Overview 2016

 Download the PDF Introduction The Internet has changed forever how people shop. By 2018, around one in five of the world’s population will shop online; with ever more people doing so on a mobile device rather than a computer. In fact, it is estimated that by the end of 2017, 60% of e-commerce will come from smartphones. That’s millions of p
Publish At:2016-11-14 12:30 | Read:1701 | Comments:0 | Tags:Analysis Featured Publications Cybercrime Financial malware

Industrial cybersecurity threat landscape

 Download ICS availability statistics (PDF version)  Download ICS vulnerabilities statistics (PDF version) Overview Industrial control systems (ICS) surround us: they are used in electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g., automot
Publish At:2016-07-11 16:40 | Read:1445 | Comments:0 | Tags:Analysis Featured Publications Industrial control systems In

KSN Report: Mobile ransomware in 2014-2016

Part 1. KSN Report: PC ransomware in 2014-2016  Download PDF version Statistics The activity of mobile ransomware, although not as widely covered in the media as PC ransomware, also skyrocketed over the period covered by this report. Especially in the second half. Fig. 12: The number of users encountering mobile ransomware at least once in the period A
Publish At:2016-06-29 12:05 | Read:1983 | Comments:0 | Tags:Analysis Featured Publications Financial malware Malware Sta

KSN Report: Ransomware in 2014-2016

Executive summary and main findings Ransomware is a type of malware that, upon infecting a device, blocks access to it or to some or all of the information stored on it. In order to unlock either the device or the data, the user is required to pay a ransom, usually in bitcoins or another widely used e-currency. This report covers the evolution of the threat
Publish At:2016-06-24 09:00 | Read:1862 | Comments:0 | Tags:Analysis Featured Publications Crypto Financial malware Malw

KSN Report: Ransomware from 2014-2016

Executive summary and main findings Ransomware is a type of malware that, upon infecting a device, blocks access to it or to some or all of the information stored on it. In order to unlock either the device or the data, the user is required to pay a ransom, usually in bitcoins or another widely used e-currency. This report covers the evolution of the threat
Publish At:2016-06-22 15:50 | Read:1485 | Comments:0 | Tags:Analysis Featured Publications Crypto Financial malware Malw

IT threats during the 2016 Olympic Games in Brazil

Olympic threats designed to trick you Are you planning to visit Brazil during the Olympic Games? Or watch it online? In this blog post we discuss the threats to visitors aiming to travel to Brazil to watch the games and to those planning to watch it online. In the first part we’ll talk about phishing attacks, including one against the organizers of the
Publish At:2016-06-13 12:50 | Read:1876 | Comments:0 | Tags:Analysis Featured Publications ATM Fraud Phishing Social Eng

CVE-2015-2545: overview of current threats

CVE-2015-2545 is a vulnerability discovered in 2015 and corrected with Microsoft’s update MS15-099. The vulnerability affects Microsoft Office versions 2007 SP3, 2010 SP2, 2013 SP1 and 2013 RT SP1. The error enables an attacker to execute arbitrary code using a specially crafted EPS image file. The exploit uses PostScript and can evade Address Space L
Publish At:2016-05-25 11:40 | Read:3429 | Comments:0 | Tags:Analysis Featured Publications APT APT criminal Cyber espion

Malware and non-malware ways for ATM jackpotting. Extended cut

Cash machines have been part of our lives since 1967 when a London branch of Barclays Bank unveiled the first ATM. Millions of people around the world now use ATMs every day to withdraw cash, pay in to their account or make a variety of payments. When using ATMs people give little or no thought to the hardware, software or security of the machines. Unfortun
Publish At:2016-04-26 14:10 | Read:1674 | Comments:0 | Tags:Analysis Featured Publications ATM ATM attacks Cybercrime

Attack on Zygote: a new twist in the evolution of mobile threats

The main danger posed by apps that gain root access to a mobile device without the user’s knowledge is that they can provide access to far more advanced and dangerous malware with highly innovative architecture. We feared that Trojans obtaining unauthorized superuser privileges to install legitimate apps and display advertising would eventually start
Publish At:2016-03-03 09:00 | Read:2039 | Comments:0 | Tags:Analysis Featured Publications Banking Trojan Google Android

Russian financial cybercrime: how it works

 Download PDF version Introduction The Russian-language cybercrime market is known all over the world. By ‘Russian-language market’ we mean cybercriminals who are citizens of the Russian Federation and some former USSR countries, predominantly Ukraine and the Baltic states. Why is this market known worldwide? There are two main factors: the
Publish At:2015-11-20 09:25 | Read:1112 | Comments:0 | Tags:Analysis Featured Publications Cyber espionage Cybercrime Cy

Beaches, carnivals and cybercrime: a look inside the Brazilian underground

 Download PDF version Introduction The Brazilian criminal underground includes some of the world’s most active and creative perpetrators of cybercrime. Like their counterparts in China and Russia, their cyberattacks have a strong local flavor. To fully understand them you need spend time in the country and understand its language and culture. The
Publish At:2015-11-13 15:05 | Read:1875 | Comments:0 | Tags:Analysis Featured Publications Credit Cards Cybercrime Finan

Surviving in an IoT-enabled world

Scare stories around the Internet of Things (IoT) conjure up images of bad guys in hoodies, who live for hacking and to make the lives of other people harder, inventing millions of ways to infiltrate your life through your gadgets. But is this perception a good enough reason to stop using smart devices? We don’t think so; we believe that customers shou
Publish At:2015-11-05 09:05 | Read:1166 | Comments:0 | Tags:Analysis Publications Internet of Things

I am HDRoot! Part 2

Some time ago while tracking Winnti group activity we came across a suspicious 64-bit sample. It was a standalone utility with the name HDD Rootkit for planting a bootkit on a computer. Once installed the bootkit infects the operating system with a backdoor at the early booting stage. The principles of this bootkit’s work, named HDRoot, have been descr
Publish At:2015-10-13 07:15 | Read:1102 | Comments:0 | Tags:Analysis Featured Publications APT Bootkit Cyber espionage D

I am HDRoot! Part 1

Some time ago while tracking Winnti group activity we came across an intriguing sample. MD5 Size Linker Compiled on 2C85404FE7D1891FD41FCEE4C92AD305 241’904 10.00 2012-08-06 16:12:29 Property Value CompanyName Microsoft Corporation FileDescription Net Command FileVersion 6.1.7600.16385 (win7_rtm.090713-1255) InternalName net.exe LegalCopyright ©
Publish At:2015-10-06 01:45 | Read:1798 | Comments:0 | Tags:Analysis Featured Publications APT Bootkit Cyber espionage D

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud