Categories

Posts by Adam Kujawa

Lead of the Malware Intelligence Team with nearly 10 years of experience fighting malware behind the scenes and on the front. Follow me @kujman5000

So You Want To Be A Malware Analyst

In war, there are always two sides: the attackers and the defenders.  A less focused on group is the researchers and developers.  While soldiers are fighting a war on the front lines, scientists and engineers are researching and developing new weapons, defenses and tools; things that give their side an advantage.  If one of these […]

Call Me Phishy

A few months ago, I did a series on Phishing, called Phishing 101. In it, I described various ways in which cyber-criminals are trying to steal information by swindling users with fake web sites, social network spamming and even lures in video games.  This week I wanted to touch on a method that has been […]

Malwarebytes: Fighting To The Top

You might not be aware of this but Anti-Malware and antivirus software gets tested every year along with other similar security software. The purpose of these tests is to identify which product is the best at detecting malware.  This process involves a third party organization using up-to-date versions of the software and running them all […]

Passing The BitCoin

BitCoin is a new-ish form of digital currency.  It allows people to perform financial transactions without the need for a bank or central authority and allows for a large amount of privacy.  Transactions are currently limited to ones performed online and only by individuals and organizations that accept BitCoin as payment. However, in the next […]

Malwarebytes Wants You! In The Fight Against Malware!

Malwarebytes was born out of the malware fighting community. I am not just talking about antivirus vendors and experts but from everyday people who wanted to take a stand against malware and help other people fight it too. It is because of that origin that we not only try to give back to the community […]

ALERT: New Bank Phishing Attempts

A new phishing scam is going around and trying to grab user log-on credentials  for popular banks like HSBC, Lloyds TSB & Chase. The phishing emails advertise one of the following reasons in order to trick the user into clicking the provided link: There are security Messages available to the user which they  need to […]

Malwarebytes @ DefCon: The Wrap-Up

As mentioned last week, the Malwarebytes crew made it out to DefCon this year to check out all of the interesting talks and presentations given by various members of the computer/intelligence security community. This blog is meant to summarize most of what we saw, giving a brief explanation of which talks we thought were the […]

Malwarebytes @ DefCon

That’s right, this week some of the Malwarebytes gang will be out in Las Vegas for the hacker convention: DefCon 20! Who is going? Marcin Kleczynski – CEO Rebecca Kline – Director of Marketing Josh Hall-Bachner – Web Developer Doug Swanson – VP of Development Adam Kujawa – Me! What are we doing there? DefCon […]

The Malware That I Used To Know

Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator and their organization or the general intent that it was created for.  Unlike most weapons though, malware evolved with a pattern closer to that of a biological disease.  Early variants were created and most […]

Malwarebytes U.S. Removal Stats for June

Here at Malwarebytes, we are known to talk a big game and we wanted you to know that we always back it up.  Check out the Top 10 Malwarebytes Removals across the U.S. for June 2012 and see for yourself!   While we applaud the states we listed for using our product to keep themselves […]

Phishing 101: Part 3

Over the last few weeks I have described numerous methods of phishing attacks and a few examples what they do or may look like.  In this final installment, I will shed some light on how phishing attacks are done and a few real world examples of techniques used by Phishing scammers.  Finally, I will discuss […]

BlackShades Co-Creator Arrested!

Last week, it was announced that one of the creators of BlackShades NET Remote Access Trojan was arrested along with 23 others in an international assault against cybercrime. As you recall from previous blogs posted on Unpacked, we have given you, the reader, an in-depth look into what kind of dangers are presented by the […]

Phishing 101: Part 2

“Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me If there is one thing you can say about cybercriminals, it’s that they are adaptive. As I mentioned last week, phishing attacks have evolved from just fake web pages and official looking emails to […]

Phishing 101: Part 1

This week, there is a lot of media hype over emails being sent to users of the Royal Bank of Scotland and NatWest because of severe IT issues making it impossible for users to access their accounts online. The emails offer users the ability to log-in to their accounts and provide a link to the […]

BlackShades in Syria

As reported by the Electronic Frontier Foundation (EFF) earlier this week, a new Trojan is being spread to Syrian activists in an attempt to employ electronic surveillance on the group and its members.  This Trojan is none other than the BlackShades RAT I blogged about last week as Part 2 of a series on different […]

You Dirty RAT! Part 2 – BlackShades NET

Last week we talked about the Remote Administration Trojan DarkComet and all the wonderful and scary things it can do.  In response to the twitter post announcing the blog, the author of DarkComet tweeted an answer to my big bold question: “Considering that this is a Remote Administration Tool, to be used for good and […]

You Dirty RAT! Part 1 – DarkComet

Last week, I talked a little about the Flame Trojan and how much the average user would need to worry about being infected with it, which is none.  State-sponsored RAT malware, like Flame, would likely not infect average users and even in the off chance that it did, the operators behind the malware would probably […]

RATs of Unusual Sizes

The flame malware has been referred to by some as “The most sophisticated malware to date” and while it is quite an impressive piece of espionage spyware, it poses little threat to the common user. In this blog post I am going to go over a quick summary of the technical capabilities of the Flame […]

You can’t buy happiness but you can advertise it!!

Since December of 2011, the spread of malicious advertisements, or “Malvertisements”, has drastically increased. Along with this trend is the increased spread of some pretty nasty malware. One in particular is called Happili, an adware trojan that installs a browser extension to re-direct legitimate search queries to ad sites.

DDOS, Botnets and Worms…Oh My!

The recent attack on the Serious Organized Crime Agency (SOCA), most likely in response to the 36 data selling sites shut down a few weeks ago, lead to the admission by high ranking SOCA officials that the Ministry of Defense networks need to “beef up their security.”  In response to this we would like to […]

« Previous PageNext Page »

Subscribe to our YouTube Channel