JudulBeritaDiposting
ATM infector

Seven years ago, in 2009, we saw a completely new type of attack on
banks. Instead of infecting the computers of thousands of users
worldwide, criminals went directly after the ATM itself – infecting it
with malware called Skimer. Seven years later, our Global Research and

Jumat, 03 Jun 2016
Carding Sites Turn to the ‘Dark Cloud’

Crooks who peddle stolen credit cards on the Internet face a constant
challenge: Keeping their shops online and reachable in the face of
meddling from law enforcement officials, security firms, researchers and
vigilantes. In this post, we’ll examine a large collection of h

Jumat, 03 Jun 2016
The Car Hacker's Handbook - A Guide for the Penetration Tester

Full Disclosure: they sent us a copy to read

Excerpt:

"Table of Contents:

Chapter 1: Understanding Threat Models
Chapter 2: Bus Protocols
Chapter 3: Vehicle Communication with SocketCAN
Chapter 4: Diagnostics and Logging
Chapter 5: Reverse Engi

Jumat, 03 Jun 2016
What are 150,000 stolen press releases worth? About 20 years in prison

Press releases. A dime a dozen, right? What could be more worthless?
Unless you break into the systems where they’re being staged for
release, steal them before they go public, and then help people trade on
the secrets you’ve uncovered.

Then, you can make mil

Jumat, 03 Jun 2016
Chinese-language Ransomware Makes An Appearance

Whenever a threat is “localized” to a specific region, it’s a sign that
attackers believe there is money to be made. Ransomware has made
millions of dollars around the world, and it looks like it’s poking its
nose into a new part of the world: China. Howe

Jumat, 03 Jun 2016
Hacker leaks data from darknet hitman website

There’s a saying about “honor among thieves” that suggests people who
break the law will respect one another. However, that is not the case at
all, particularly when it comes to cyber crime. A hacker has struck the
darknet site “Besa Mafia,” leaking

Jumat, 03 Jun 2016
Inside Nuclear’s Core: Unraveling a Ransomware-as-a-Service Infrastructure

Nuclear’s infrastructure is not the work of a lone wolf. According to
our findings, the leading developer is located in Krasnodar, Russia.
Nuclear is rented to cybercriminals for a few thousand dollars a month.
We found 15 active Nuclear control panels. Doing the math, we

Jumat, 03 Jun 2016
iOS app detecting phones jailbroken by malware booted from App Store

The System and Security Info iOS app by German IT security outfit
SektionEins has been pulled from Apple’s App Store less than a week
after it was made available.

The app shows detailed information about the device it is installed –
info on CPU, memory and di

Jumat, 03 Jun 2016
Petya is back and with a friend named Mischa Ransomware

A new installer for Petya was released that also installs the Mischa
Ransomware if it is unable to gain Administrative privileges.  In the
past, when Petya was installed it requested Administrative privileges so
that it could modify the master boot record. If it was unable

Jumat, 03 Jun 2016
Banking Trojan has infected at least 40K Android users worldwide

Hundreds of different banking Trojans attack Android users, one being
Android.SmsSpy.88.origin, which was first spotted in 2014.

Despite seeming outdated, Doctor Web researchers say the popularity
rating is still high. Cyber-criminals have made the Trojan more
dangerous

Jumat, 03 Jun 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: