HackDig : Dig high-quality web security articles for hacker

When cyber-security becomes an affair of state

The Netherlands, France and Germany will hold presidential elections in the coming months. A series of electoral processes that take place in the wake of the U.S. elections, during which, Russian cyber-attackers leaked thousands of Democratic National Committee emails which some claim may have affected the election result – a possibility ruled out by P
Publish At:2017-03-07 21:20 | Read:2585 | Comments:0 | Tags:Security advanced cyber-security european elections targeted

From Shamoon to StoneDrill

 Download full report Beginning in November 2016, Kaspersky Lab observed a new wave of wiper attacks directed at multiple targets in the Middle East. The malware used in the new attacks was a variant of the infamous Shamoon worm that targeted Saudi Aramco and Rasgas back in 2012. Dormant for four years, one of the most mysterious wipers in history has
Publish At:2017-03-07 15:00 | Read:4789 | Comments:0 | Tags:Blog Featured Research APT Shamoon Targeted Attacks Wiper

ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar

ViperRAT is an active, advanced persistent threat (APT) that sophisticated threat actors are actively using to target and spy on the Israeli Defense Force. The threat actors behind the ViperRAT surveillanceware collect a significant amount of sensitive information off of the device, and seem most interested in exfiltrating images and audio content. The atta
Publish At:2017-02-17 03:30 | Read:3921 | Comments:0 | Tags:Alerts Enterprise Mobile Security Security APT IDF mobile ma

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at t
Publish At:2017-02-16 16:40 | Read:4370 | Comments:0 | Tags:Blog Featured Incidents Mobile Attacks Obfuscation Social En

Where to find Lookout at RSA 2017

After a year full of headlines about data breaches and cyber war, it’s clear people want to know about the targeted attacks facing them. That’s what we’re providing at this year’s RSA. We’ve planned a talk, a happy hour, and a great booth for all RSA attendees, especially those interested in learning about targeted mobile threats to corporate data. The tal
Publish At:2017-02-04 01:50 | Read:2594 | Comments:0 | Tags:Enterprise Mobile Security conference mobile security RSA RS

Not so Limitless after all: Trend Micro FTR Assists in the Arrest of Limitless Author

On January 13, college student Zachary Shames pleaded guilty to a federal district court in Virginia, US, for authoring Limitless Logger, the malicious keylogger that was used to steal thousands of sensitive user information like passwords and banking credentials. In November 2014, Trend Micro’s Forward Looking Threat Research team (FTR) published a research
Publish At:2017-01-19 14:25 | Read:3683 | Comments:0 | Tags:Malware Targeted Attacks arrest law enforcement limitless

Uncovering the Inner Workings of EyePyramid

Two Italians referred to as the “Occhionero brothers” have been arrested and accused of using malware and a carefully-prepared spear-phishing scheme to spy on high-profile politicians and businessmen. This case has been called “EyePyramid”, which we first discussed last week. (Conspiracy theories aside, the name came from a domain name and direct
Publish At:2017-01-18 20:00 | Read:6819 | Comments:0 | Tags:Malware Targeted Attacks EyePyramid Italy

The Eye of the Storm: A Look at EyePyramid, the Malware Supposedly Used in High-Profile Hacks in Italy

Two Italian citizens were arrested last Tuesday by Italian authorities (in cooperation with the FBI) for exfiltrating sensitive data from high-profile Italian targets. Private and public Italian citizens, including those holding key positions in the state, were the subject of a spear-phishing campaign that reportedly served a malware, codenamed EyePyramid, a
Publish At:2017-01-12 16:40 | Read:3766 | Comments:0 | Tags:Malware Targeted Attacks EyePyramid Italy

How Cyber Propaganda Influenced Politics in 2016

Throughout history, politically motivated threat actors have been interested in changing the public opinion to reach their goals. In recent years the popularity of the Internet gave these threat actors new tools. Not only do they make use of social media to spin the news, spread rumors and fake news, but they also actively hack into political organizations.
Publish At:2017-01-12 16:40 | Read:2440 | Comments:0 | Tags:Social Targeted Attacks cyber propaganda Pawn Storm

Leaking Beeps: IT Systems Broadcasting Sensitive Info

In our previous installments of the Leaking Beeps research series, we have discussed that both healthcare and industrial control systems have been sending clear text messages via the pager communications protocols POCSAG and FLEX. We were surprised to see pages containing sensitive patient information when we looked into the use of pagers in the healthcare s
Publish At:2016-12-14 02:11 | Read:3757 | Comments:0 | Tags:Targeted Attacks FLEX pagers POCSAG

CEO Fraud Email Scams Target Healthcare Institutions

A series of Business Email Compromise (BEC) campaigns that used CEO fraud schemes was seen targeting 17 healthcare institutions in the US, ten in the UK, and eight in Canada over the past two weeks. These institutions range from general hospitals and teaching hospitals to specialty care and walk-in clinics. Even pharmaceutical companies were not safe from th
Publish At:2016-11-24 02:35 | Read:2929 | Comments:0 | Tags:Malware Targeted Attacks BEC business email compromise CEO f

Business travel: The mobile risks to your corporate data

The holidays bring a season heavy with travel plans. That might include your employees. Lookout Chief Product Officer Santosh Krishnan recently published an article in Help Net Security that outlines the potential mobile risks to your corporate data while your employees are on the go. Krishnan specifically addresses targeted attacks, such as the Pegasus mal
Publish At:2016-11-22 16:45 | Read:1971 | Comments:0 | Tags:Security business travel juice-jacking mobile risks network

BLACKGEAR Espionage Campaign Evolves, Adds Japan To Target List

By Joey Chen and MingYen Hsieh BLACKGEAR is an espionage campaign which has targeted users in Taiwan for many years. Multiple papers and talks have been released covering this campaign, which used the ELIRKS backdoor when it was first discovered in 2012. It is known for using blogs and microblogging services to hide the location of its actual command-and-con
Publish At:2016-11-19 12:05 | Read:2451 | Comments:0 | Tags:Malware Targeted Attacks BLACKGEAR ELIRKS

Pawn Storm Ramps Up Spear-phishing Before Zero-Days Get Patched

by Feike Hacquebord and Stephen Hilt  The effectiveness of a zero-day quickly deteriorates as an attack tool after it gets discovered and patched by the affected software vendors. Within the time between the discovery of the vulnerability and the release of the fix, a bad actor might try to get the most out of his previously valuable attack assets. This is e
Publish At:2016-11-19 12:05 | Read:3152 | Comments:0 | Tags:Exploits Targeted Attacks Vulnerabilities Adobe zero-day exp

Google discloses Windows zero-day that has been exploited in the wild

Google has disclosed a Windows zero-day vulnerability after 7-day deadline it gives vendors when the flaw is actively exploited in the wild by hackers. Google has once again publicly disclosed a zero-day vulnerability affecting current versions of Windows operating system  and Microsoft still hasn’t issued a patch. Yes, you’ve got it right! There
Publish At:2016-11-01 20:55 | Read:2976 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Google Kernet targeted att


Share high-quality web security related articles with you:)


Tag Cloud