A modern smartphone is a full-blown working tool, an entertainment center and a tool to manage your personal finances. The more it can do, the more attractive it is to cybercriminals. The evidence for this is clear when we look at the rapid growth in the numbers of mobile Trojans.
In 2009, an international scientific conference was held in Houston. The organizers sent out a post-meeting CDROM. The disk used in the Houston attack represents a rare and unusual operation for the Equation Group.
In this post, let's examine several additional plugins more closely, targeting details around BE2 Siemens exploitation, and some of their unusual coding failures.
The Desert Falcons are a new group of Cyber Mercenaries operating in the Middle East; there are more than 3,000 victims in 50+ countries around the world, more than 1 million files were stolen including diplomatic, military and financial documents.
During our 2014 research into the Equation group, we created a special detection for the group’s exploitation library, codenamed “PrivLib”. To our surprise, this detection triggered a worm from 2008 that used the Stuxnet LNK exploit to replicate, codenamed Fanny.
The Equation group is a highly sophisticated threat actor that has been engaged in multiple CNE (computer network exploitation) operations dating back to 2001, and perhaps as early as 1996. It is probably one of the most sophisticated cyber attack groups in the world.
The main difference with other APT attacks is that Carbanak attackers do not see data but money as their primary target. Losses per bank range from $2.5 million to approximately $10 million. Carbanak is the most successful criminal cyber campaign we have ever seen.
In 2013 we registered a sudden surge in the number of attacks targeting users’ financial information and money. In 2014, the situation changed considerably: the number of attacks and attacked users significantly decreased, as did the amount of financial phishing.
Over the last decade DKIM signatures have become an important technology in the extensive list of methods for fighting against spam. In this article we investigate the structure of DKIM, reveal the main advantages and downsides of this technology and explore typical spammers’ tricks for forging DKIM signatures.
A few days ago we came across an excellent example of a mass mailing where spammers took full advantage of this universal fascination with destruction.