A search online lead me to a discovery I didn’t think was possible nowadays. I realized almost immediately that critical security issues were probably involved. I found that out of the many tens of thousands of gas stations the company claimed to have installed their product in, 1,000 are remotely hackable. Read Full Article
Breaking The Weakest Link Of The Strongest Chain
Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ C&C. In addition, the compromised devices were pushed Trojan updates. The operation remains active at the time of writing this post. Read Full Article
One-stop-shop: Server steals data then offers it for sale
While intercepting traffic from a number of infected machines that showed signs of Remote Admin Tool malware known as HawkEye, we stumbled upon an interesting domain. It was registered to a command and control server (C2) which held stolen keylog data from HawkEye RAT victims, but was also being used as a one-stop-shop for purchasing hacking goods. Read Full Article
CryPy: ransomware behind Israeli lines
A Tweet posted recently by AVG researcher, Jakub Kroustek, suggested that a new ransomware, written entirely in Python, had been found in the wild, joining the emerging trend for Pysomwares such as the latest HolyCrypt, Fs0ciety Locker and others. Read Full Article
Facebook malware – the missing piece
Recently we revealed that a threat actors exploited social networks to spread a Trojan that captures a victim’s entire browser traffic. Approximately 10,000 Facebook users with Windows PCs were hit by malicious friend notifications. In this article we will explain the security issue and attack. Read Full Article
Facebook malware: tag me if you can
A malware attack tricked around 10,000 Facebook users around the world. Compromised PCs were used to hijack Facebook accounts in order to spread the infection through the victim’s Facebook friends and for other malicious activity. Read Full Article
CTB-Locker is back: the web server edition
We have seen many shapes and colors of cryptolockers, but the new CTB-Locker variant says it all. A new variant of the CTB-Locker targets web servers only, and to our knowledge it has already successfully encrypted web-root files in more than 70 servers. Read Full Article
ATMZombie: banking trojan in Israeli waters
On November 2015, Kaspersky Lab researchers identified ATMZombie, a banking Trojan that is considered to be the first malware to ever steal money from Israeli banks. The incident Israeli banks experienced had a very fascinating and innovative method of stealing the money. Read Full Article
0xHACKED: Brown University Accounts Distributing Phishing Emails
Suspected spear phishing campaign attempting to steal users’ credentials by sending phishing emails masquerading as Google recovery. Read Full Article
Taking A Break From Research To Accelerate Startups: SSC 2015
The security giant Kaspersky Lab launched its lavish acceleration program and a team of mentors, including myself, took their seats on the front row, waiting for the most brilliant and innovative minds to take the stage and convince us that they deserve a spot in the Bootcamp. Read Full Article