NotPetya – infection by legitimate auto-update

It seems the malware NotPetya, which infected mainly computer in Ukraine recently, was spread by a regular software update. As reported previously, the option to decrypt data is only “simulated” – a real decryption is not possible. Backdoor in .NET According to an analysis by ESET the tax software M.E.Doc – a popular tax software in Ukraine – Read More …

14 Million Verizon customers data leaked

ZDNet reports that data of more than 14 million Verizon customers were available for download on an unsecured Amazon S3 server.       Apparently, it was log data created within the last 6 months in the Verizon Customer Center from each customer who called. Verizon logs all calls and operations for immediately analyze – Verizon uses the data Read More …

Petya master key published

The author of the ransomware Petya, who attacked many PC in 2016 posted a link to an encrypted file on mega.nz via Twitter on Wednesday. Meanwhile the encrypted file was cracked by Malwarebytes, and they shared the content: Congratulations! Here is our secp192k1 privkey: 38dd46801ce61883433048d6d8c6ab8be18654a2695b4723 We used ECIES (with AES-256-ECB) Scheme to encrypt the decryption Read More …

ELSA: CIA’s WLAN signal sniffer hidden on your Windows

Another update in WikiLeaks Vault7-Series. This time meet ELSA, a malware capable to geo-locate your WiFi-enabled device running Microsoft Windows, storing all data for later analysis. Installed by other Malware Elsa does not have own code to spread or install itself onto any PC, according to the documentation you need to use another leak or security Read More …