HackDig : Dig high-quality web security articles for hacker

The Ukrainian central bank warned of new NotPetya-style massive attack risk

The Ukrainian central bank warned state-owned and private lenders of the appearance of new the NotPetya-like attack that would target national businesses. On Friday, the Ukrainian central bank warned of new malware-based attack risk. According to the Reuters, the Ukrainian central bank warned state-owned and private lenders of the spreading of new infections
Publish At:2017-08-19 08:55 | Read:280 | Comments:0 | Tags:Breaking News Cyber warfare Hacking Malware notpetya Petya r

Anti-Israel and pro-Palestinian IsraBye wiper spreads as a ransomware

Malware researchers discovered an anti-Israel & pro-Palestinian data wiper dubbed IsraBye that is spreading as a ransomware. Malware researcher Jakub Kroustek from Avast has recently discovered an anti-Israel & pro-Palestinian data wiper dubbed IsraBye. Even if the lock screen claims that the files can be recovered, their content is replaced with an
Publish At:2017-08-13 23:35 | Read:268 | Comments:0 | Tags:Breaking News Malware IsraBye Israel malware ransomware Sabo

No Free Pass for ExPetr

Recently, there have been discussions around the topic that if our product is installed, ExPetr malware won’t write the special malicious code which encrypts the MFT to MBR. Some have even speculated that some kind of conspiracy might be ongoing. Others have pointed out it’s plain and simple nonsense. As usual, Vesselin Bontchev, a legend in IT s
Publish At:2017-07-13 22:50 | Read:356 | Comments:0 | Tags:Research ExPetr Petya Ransomware Wiper

From BlackEnergy to ExPetr

Much has been written about the recent ExPetr/NotPetya/Nyetya/Petya outbreak – you can read our findings here:Schroedinger’s Pet(ya) and ExPetr is a wiper, not ransomware. As in the case of Wannacry, attribution is very difficult and finding links with previously known malware is challenging. In the case of Wannacry, Google’s Neel Mehta was
Publish At:2017-06-30 21:50 | Read:409 | Comments:0 | Tags:Research APT BlackEnergy Data Encryption Petya Wiper

Notpetya – The Petya variant used in the massive attack is a wiper disguised by a ransomware

According to the researchers, the Petya variant (NotPetya) used in the massive attack is a wiper disguised by a ransomware. In these hours the massive global attack based on Petya variant made the headlines, computers in many countries were infected, including Russia, Ukraine, France, India and the US. A new analysis conducted on the ransomware reveals the t
Publish At:2017-06-30 04:50 | Read:278 | Comments:0 | Tags:Breaking News Hacking Malware notpetya Petya ransomware rans

ExPetr/Petya/NotPetya is a Wiper, Not Ransomware

After an analysis of the encryption routine of the malware used in the Petya/ExPetr attacks, we have thought that the threat actor cannot decrypt victims’ disk, even if a payment was made. This supports the theory that this malware campaign was not designed as a ransomware attack for financial gain. Instead, it appears it was designed as a wiper prete
Publish At:2017-06-28 19:25 | Read:312 | Comments:0 | Tags:Featured Incidents Petya Ransomware Wiper

APT Trends report, Q1 2017

Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations targeting commercial and government organizations in over 80 countries. During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with Indicators of Compromise (IOC) data and YARA rules to as
Publish At:2017-04-27 19:15 | Read:743 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports APT fileless mal

APT Threat Evolution in Q1 2017

Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations targeting commercial and government organizations in over 80 countries. During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with Indicators of Compromise (IOC) data and YARA rules to as
Publish At:2017-04-27 05:40 | Read:453 | Comments:0 | Tags:Analysis Featured Quarterly Malware Reports APT fileless mal

Shamoon 2 – Palo Alto Networks sheds lights on the method for network distribution

Security researchers at Palo Alto Networks have determined that the Shamoon 2 malware uses a rudimentary technique for network distribution. Security researchers at Palo Alto Networks continue to analyze the dreaded Shamoon 2 malware and the recent waves of attacks, now they have determined that the threat uses a rudimentary technique for network distributio
Publish At:2017-03-29 03:00 | Read:568 | Comments:0 | Tags:Breaking News Cyber Crime Malware cyber espionage malware Sa

Kaspersky Lab discovered a new sophisticated Shamoon-Linked malware dubbed StoneDrill

The experts spotted a new sophisticated strain of malware dubbed StoneDrill that is linked to Shamoon 2 and Charming Kitten. Researchers at Kaspersky Lab have discovered further information about the dreaded Shamoon 2 malware. The experts spotted a new sophisticated strain of malware dubbed StoneDrill that is linked to Shamoon 2 and Charming Kitten (aka News
Publish At:2017-03-08 06:00 | Read:598 | Comments:0 | Tags:APT Breaking News Cyber Crime Hacking Malware cyber espionag

From Shamoon to StoneDrill

 Download full report Beginning in November 2016, Kaspersky Lab observed a new wave of wiper attacks directed at multiple targets in the Middle East. The malware used in the new attacks was a variant of the infamous Shamoon worm that targeted Saudi Aramco and Rasgas back in 2012. Dormant for four years, one of the most mysterious wipers in history has
Publish At:2017-03-07 15:00 | Read:1006 | Comments:0 | Tags:Blog Featured Research APT Shamoon Targeted Attacks Wiper

Shamoon 2 malware, ASERT has shed light on the C2 and the infection process

The analysis conducted by Arbor Networks on the Shamoon 2 malware has shed light on the control infrastructure and the infection process. Security researchers from Arbor Networks’ Security Engineering and Response Team (ASERT) have conducted a new analysis of the Shamoon 2 malware discovering further details on the tools and techniques used by the threat act
Publish At:2017-02-26 17:50 | Read:817 | Comments:0 | Tags:APT Breaking News Cyber warfare Intelligence Malware cyber e

Symantec speculates Shamoon 2 attacks aided by Greenbug hackers

Security researchers at Symantec believed that Shamoon 2 attacks leveraged credentials stolen by hackers of the Greenbug group. A few days ago security experts at Palo Alto Networks have spotted a new strain of the Shamoon 2 malware that was targeting virtualization products. In December malware researchers from Palo Alto Networks and Symantec discovered a n
Publish At:2017-01-26 05:50 | Read:835 | Comments:0 | Tags:Breaking News Cyber Crime Mobile cyber espionage Greenbug Is

Second Wave of Shamoon 2: Disttrack Can Now Wipe Organizations’ VDI Snapshots

On November 17, 2016, the security community witnessed the resurgence of a familiar enemy. That’s the day when Shamoon 2, the successor of an attack campaign which first emerged in 2012, delivered Disttrack wiper malware to an organization based in Saudi Arabia.True to its design, Disttrack spread through the company’s network and overwrote the M
Publish At:2017-01-13 02:50 | Read:970 | Comments:0 | Tags:Cyber Security Featured Articles Disttrack malware MBR Shamo

A Second variant of Shamoon 2 targets virtualization products

A second variant of the Shamoon 2 malware was discovered by researchers at Palo Alto Networks, this threat also targets virtualization products. A new strain of the Shamoon 2 malware was spotted by the security experts at Palo Alto Networks, this variant targets virtualization products. Shamoon, also known as Disttrack, was first spotted in a wave of attacks
Publish At:2017-01-10 19:20 | Read:849 | Comments:0 | Tags:Breaking News Cyber Crime Malware cyber espionage malware Sa

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud