Eastern Europe and ex-USSR

Russian criminals’ bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and a new breed of mobile attack apps is coming up next.Criminals stole nearly $44 million directly …

Russian criminals’ bank attacks go global

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and a new breed of mobile attack apps is coming up next.
Criminals stole nearly $44 million directl…

RIG exploit kit takes over while Angler on vacation

The Angler exploit kit went on vacation during the first two weeks of the year, but the Russia-hosted RIG exploit kit was there to ensure that there would be no respite for users from malvertising and malicious drive-by downloads, according to a new…

Global geopolitical risk predictions for 2016

The previous 25 years have been marked by globalization. A number of forces acted together to bring our planet closer together. Trade pacts, peacekeeping alliances, the Internet.But now, according to Christopher Swift, a professor of national securi…

East European botnet targets Russian banks

Cybercriminals based in Russia and Eastern Europe typically avoid targets in their home countries, but a botnet called Tinba is proving to be an exception, according to a new report from the Dell SecureWorks’ Counter Threat Unit.

The Tinba Banking Trojan, also known as Tiny Banker because of its small file size, is targeting the biggest banks and payment service providers in Russia, said Brett Stone-Gross, senior security researcher at Dell SecureWorks.

It is believed to be controlled by a group operating out of Eastern Europe.

A total of 34.5 percent of the victims of the botnet were located in Russia, and another 22 percent of victims were in Poland.

To read this article in full or to leave a comment, please click here

Russian military attacked, possibly by Chinese cyber group

Members of the Russian military have been receiving well-crafted phishing emails since mid-summer from attackers that use Chinese-language tools and Chinese command-and-control installations, according to a report released yesterday.The campaign als…

GameOver ZeuS criminals spied on Turkey, Georgia, Ukraine and OPEC

The criminals behind the GameOver ZeuS Botnet didn’t just steal $100 million from banks — they also spied on several countries on behalf of Russia, according to a Black Hat presentation Wednesday by an FBI agent and two other security experts.

These countries included Ukraine, Turkey, Georgia, and OPEC members, according to FBI special agent Elliott Peterson.

The gang, which called itself Business Club, had two leaders, one of whom was Evgeniy Bogachev who is still uncaught. The FBI is offering a $3 million reward for information leading to Bogachev’s arrest.

[ Follow all the stories out of Black Hat 2015 ]

To read this article in full or to leave a comment, please click here