Category Archives: Security

Carding – Scenario ed evoluzione dei canali di vendita

Questa analisi è stata inserita nel REPORT CLUSIT 2019 – https://clusit.it/rapporto-clusit/ Introduzione Il presente report redatto dal Team di Cyber Threat Intelligence di Lutech, ha lo scopo di presentare lo scenario attuale relativo alla compravendita illegale di carte di credito su internet, fenomeno noto come Carding. Attraverso i nostri sistemi proprietari di ricerca, attivi su … Continue reading Carding – Scenario ed evoluzione dei canali di vendita

Carding – Tecniche di vendita: evoluzioni recenti e future

Questa analisi è stata inserita nel REPORT CLUSIT 2018 – https://clusit.it/rapporto-clusit/ Introduzione Il presente report redatto dal Team di Cyber Threat Intelligence di Lutech, ha lo scopo di presentare lo scenario attuale relativo alla compravendita illegale di carte di credito su internet, fenomeno noto come Carding. Attraverso i nostri sistemi proprietari di ricerca, attivi su … Continue reading Carding – Tecniche di vendita: evoluzioni recenti e future

The TaxOlolo Affair – A Prequel and a Sequel

Why this article? Some news have been published recently about a “new” malspam campaign targetting italian users, such as these two: http://www.certego.net/en/news/new-spam-delivering-infostealer/ https://marcoramilli.blogspot.it/2018/01/huge-botnet-attacking-italian-companies.html In this campaign, the attackers are sending out forged spam messages impersonating the Italian Department of Treasury (Ministero dell’Economia e delle Finanze). The messages contain a link leading to the download and … Continue reading The TaxOlolo Affair – A Prequel and a Sequel

Malware Analysis with real time IOC feed ( EoT ) and private sources

Introduction Lutech Cyber Threat Intelligence team, with the help of Lutech EyeOnThreat™  and his own private infrastructure, identified an attack from a Chinese IP address and performed an analysis about the TTPs (Tactics, techniques and procedures) of the attacker, providing a detailed and private IoC list in real time, freely and easily available for any … Continue reading Malware Analysis with real time IOC feed ( EoT ) and private sources

Join the Navy – Is it really easy to hack a boat?

Introduction After the publication of the Ship Tracker (data powered by Shodan), Lutech Cyber Threat Intelligence team, with the help of Lutech ThreatOculus™ (also known as Lutech TMS for Cyber Threat Intelligence) and Lutech EyeOnThreat™, performed a research and reported hereby some security analysis and considerations about future possible threats related to the exposure of navy … Continue reading Join the Navy – Is it really easy to hack a boat?

Hancitor – Inside a Malware Campaign (Updated)

What is Hancitor (in short)? Hancitor (AKA Chanitor) is a malware that uses Microsoft Office documents with macros to download malicious payloads like Pony, Vawtrak and other trojans/stealers/ransomware. Recently Hancitor joined the top 5 “most wanted” malware in Check Point’s February Global Threat impact index.   Why this article? Having been active for at least … Continue reading Hancitor – Inside a Malware Campaign (Updated)