Emotet infrastracture has been disrupted in Europe

Emotet infrastracture has been disrupted in Europe

Law enforcement agencies from the several EU countries and the UK have dismantled the notorious malware Emotet. The takedown of this malicious botnet happened on Tuesday, 26th January. Emotet is a computer malware program that was originally developed in the form of a banking Trojan. Its main goal was to access devices as well as spy on sensitive private data. As threat, it was particularly sneaky. It has been known to deceive basic antivirus programs and hide from them. Finally, Emotet gained popularity in the cybercrime universe for its modular architecture. Modularity makes it tailorable for every environment it targets. Let’s discover more below. The Emotet threat Experts have labelled […]

Sunburst: the attack that shook the world

Sunburst: the attack that shook the world

Cyber analysts recently discovered the “Sunburst” attack malware, which triggered a series of cyber-espionage attacks that began in the spring of 2020. The attack involved thousands of public administrations, private organizations and individuals on a global scale. American investigators have been pointing fingers at Russian-sponsored hackers. US authorities have labelled it as the most severe cyberattack against public and private bodies alike in the United States and believe that the origin of the threat are Russia-sponsored hackers. How did the Sunburst attack happen? What happened exactly? Let’s explore which intrusion technique hackers employed in this case. First, hackers implanted a malware in the software update of a platform installed in […]

Take a hacker seriously: the story of Raphael Grey

Take a hacker seriously: the story of Raphael Grey

You will take a hacker seriously after reading the story of Raphael Grey. Raphael Grey managed to hack several e-commerce sites, accessing the customers’ credit card data for a month in 2000 at the age of 18. This hack allowed him to steal several million dollars before he was arrested by the British police and the American FBI at his home in rural Wales on March 23, 2000. Prior to his arrest, Grey posted thousands of payment data on the web to highlight the inherent weaknesses of the e-commerce sites of the time. Today we explore the activities of the best known hackers in the history of computer science, known […]

Fake vaccines online: beware of scams

Fake vaccines online: beware of scams

The NAS Carabinieri blocked two sites advertising and offering fake vaccines for COVID-19 and flu. In the latter case, subject to the obligation of medical prescription and sold only in pharmacies by a qualified pharmacist. On the first site, the Authorities noted the sale of 3 alleged vaccines for COVID-19 potentially purchasable from Italy. The analysis of the second website allowed the Carabinieri to highlight the presence of 2 flu vaccines. The World Health Organization has indeed issued a “Medical product alert” relating to possible counterfeit matches of these vaccines. The context of the operation Is it just an isolated fact? Unfortunately not. The operation of the Italian military is […]

AiR-ViBeR: the hack that exploits PC fans

AiR-ViBeR: the hack that exploits PC fans

Cyber ​​risks, as we know, have always been around the corner. They are insidious and can even silently affect the data of companies and individuals quite easily, if not adequately protected. Some threats are “louder” than others: Mordechai Guri, an Israeli researcher at Ben Gurion University of the Negev, managed to steal data from a PC, not connected to any network connection, by exploiting the vibration of the fans. The hack is called AiR-ViBeR and in order to work it needs to gain access to a PC and a second device that is in close proximity, such as a smartphone. But how does it work? The intrusion method is very […]

SolarWinds Attack: Italy activates the Cyber ​​Security Nucleus

SolarWinds Attack: Italy activates the Cyber ​​Security Nucleus

Following a tampering with a number of SolarWinds Orion platform updates in March, hackers have infiltrated the networks and computer systems of government and private entities around the world by spying on their moves and, in some cases, stealing highly sensitive data assets. The attack has also affected our country, unfortunately. From the early stages of the discovery, Italy activated the Cyber ​​Security Nucleus, the collegiate body entrusted with the task of managing cyber incidents that could have a potential impact on national security. The Cyber Security Nucleus What is this? According to the current legislation that regulates the activities of the Information Security Department (DIS) of the Presidency of […]

COVID-19 vaccine: beware of phishing

COVID-19 vaccine: beware of phishing

Have you received a strange e-mail about COVID-19, offering you various solutions to buy an under-the-counter vaccine currently in distribution? Think twice before clicking on any link. In addition to trying to sell fake Covid-19 drugs and vaccines, hackers are using the latest news as bait for their phishing campaigns. Threat intelligence analysts have warned that cybercriminals are taking advantage of developments on the COVID vaccine distribution campaign to give rise to insidious malspam campaigns. The threats What threats are we talking about? These phishing campaigns contain a myriad of malicious files. We have singled out: .EXE with the name “Download_Covid 19 New approved vaccines.23.07.2020.exe” which, once clicked, will install […]

The guy who hacked Twitter: “Kirk” and the human factor

The guy who hacked Twitter: “Kirk” and the human factor

It was a 17-year-old hacker who managed to persuade some Twitter employees that he was a collaborator of the technology department who needed the credentials to log into the customer support portal. Resident of Tampa, Florida, Graham Ivan Clark – known by the pseudonym Kirk – is defined by investigators as a teenager out of the ordinary. The story Having obtained the passwords, “Kirk” was able to enter the Twitter computer system. The intrusion involved access to hundreds of VIP profiles including Barack Obama and Bill Gates, but also Jeff Bezos, Mike Bloomberg, Warren Buffet, Wiz Khalifa, Floyd Mayweather, Elon Musk, and Kanye West. Kirk’s goal was to publish fake […]

Spyware – an almost invisible threat

Spyware – an almost invisible threat

Is your PC or mobile phone not as fast as it used to be? Has your battery started lasting less and less, despite its limited state of deterioration? Have you found that you use more data when surfing the net? If so, you may have been infected with spyware, a rather sneaky malware that lurks in about 90% of PCs without the legitimate users knowing. Spyware: what is it? Spyware is malicious software that infects your computer and spies on you for your personal data. This program can record various personal information, from search and browsing histories to login credentials to credit card information. There are different types of spyware, […]

Olivetti P101: an Italian success

Olivetti P101: an Italian success

The Olivetti “Program 101” computer (P101), presented in 1965, is considered by some to be the first “personal computer” in history, as it had all the main features of large computers of the time, but its size allowed it to be used comfortably on your desk, so much so that it was then called “desktop computer”. The success of the P101 The P101 was a huge commercial success. The P101 wanted to be a consumer product capable of meeting the working needs of the highest possible number of people. Presented at the New York fair in ’65, it had sold over 44,000 copies all over the world in just a […]