Categories

Posts by Adam Kujawa

Lead of the Malware Intelligence Team with nearly 10 years of experience fighting malware behind the scenes and on the front. Follow me @kujman5000

Pick a Download, Any Download!

Various download sites have been plastering ads all over their pages for years, some of which are just for other types of software and some of them are for services. However, a new trend among these ads has emerged, adding an extra download button where there should not be one.  Many users have been falling […]

A Picture is worth a Thousand Messages

Instant messaging is not a new concept; in fact, instant messaging software has been around for over 20 years in many different forms.  A more popular method of instant messaging these days is done with the use of the software known as Skype.  Skype allows for more than just text chatting but also calling a […]

Dark Comet 2: Electric Boogaloo

Over the past few weeks Jean-Piere Lesueur, A.K.A. DarkCoderSc, has been developing a new version of the Dark Comet Remote Administration Tool which he is calling “Dark Comet Legacy.” This newer version of the tool includes numerous features that make the tool more user-friendly and appear more legitimate.  In addition, DarkCoderSc continues to include notices […]

How to Give Malwarebytes Anti-Malware The Power!

Many PC users are content to let their hardware and software become outdated and obsolete if only because it still runs, so why update it; or as the old adage goes: “If It Ain’t Broke, Don’t Fix It”. Unlike a refrigerator or a washing machine, outdated computer components leave you vulnerable to attacks by various […]

Much Ado About Browser Malware

Browser Malware is a constant problem for all computer users. In addition to being highly intrusive and sometimes difficult to remove, it is one of the most frequently modified types of malware currently in the wild; because of this, Anti-Malware and antivirus products may not detect and remove all new variants of browser infecting malware […]

So You Want To Be A Malware Analyst

In war, there are always two sides: the attackers and the defenders.  A less focused on group is the researchers and developers.  While soldiers are fighting a war on the front lines, scientists and engineers are researching and developing new weapons, defenses and tools; things that give their side an advantage.  If one of these […]

Call Me Phishy

A few months ago, I did a series on Phishing, called Phishing 101. In it, I described various ways in which cyber-criminals are trying to steal information by swindling users with fake web sites, social network spamming and even lures in video games.  This week I wanted to touch on a method that has been […]

Malwarebytes: Fighting To The Top

You might not be aware of this but Anti-Malware and antivirus software gets tested every year along with other similar security software. The purpose of these tests is to identify which product is the best at detecting malware.  This process involves a third party organization using up-to-date versions of the software and running them all […]

Passing The BitCoin

BitCoin is a new-ish form of digital currency.  It allows people to perform financial transactions without the need for a bank or central authority and allows for a large amount of privacy.  Transactions are currently limited to ones performed online and only by individuals and organizations that accept BitCoin as payment. However, in the next […]

Malwarebytes Wants You! In The Fight Against Malware!

Malwarebytes was born out of the malware fighting community. I am not just talking about antivirus vendors and experts but from everyday people who wanted to take a stand against malware and help other people fight it too. It is because of that origin that we not only try to give back to the community […]

ALERT: New Bank Phishing Attempts

A new phishing scam is going around and trying to grab user log-on credentials  for popular banks like HSBC, Lloyds TSB & Chase. The phishing emails advertise one of the following reasons in order to trick the user into clicking the provided link: There are security Messages available to the user which they  need to […]

Malwarebytes @ DefCon: The Wrap-Up

As mentioned last week, the Malwarebytes crew made it out to DefCon this year to check out all of the interesting talks and presentations given by various members of the computer/intelligence security community. This blog is meant to summarize most of what we saw, giving a brief explanation of which talks we thought were the […]

Malwarebytes @ DefCon

That’s right, this week some of the Malwarebytes gang will be out in Las Vegas for the hacker convention: DefCon 20! Who is going? Marcin Kleczynski – CEO Rebecca Kline – Director of Marketing Josh Hall-Bachner – Web Developer Doug Swanson – VP of Development Adam Kujawa – Me! What are we doing there? DefCon […]

The Malware That I Used To Know

Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator and their organization or the general intent that it was created for.  Unlike most weapons though, malware evolved with a pattern closer to that of a biological disease.  Early variants were created and most […]

Malwarebytes U.S. Removal Stats for June

Here at Malwarebytes, we are known to talk a big game and we wanted you to know that we always back it up.  Check out the Top 10 Malwarebytes Removals across the U.S. for June 2012 and see for yourself!   While we applaud the states we listed for using our product to keep themselves […]

Phishing 101: Part 3

Over the last few weeks I have described numerous methods of phishing attacks and a few examples what they do or may look like.  In this final installment, I will shed some light on how phishing attacks are done and a few real world examples of techniques used by Phishing scammers.  Finally, I will discuss […]

BlackShades Co-Creator Arrested!

Last week, it was announced that one of the creators of BlackShades NET Remote Access Trojan was arrested along with 23 others in an international assault against cybercrime. As you recall from previous blogs posted on Unpacked, we have given you, the reader, an in-depth look into what kind of dangers are presented by the […]

Phishing 101: Part 2

“Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me If there is one thing you can say about cybercriminals, it’s that they are adaptive. As I mentioned last week, phishing attacks have evolved from just fake web pages and official looking emails to […]

Phishing 101: Part 1

This week, there is a lot of media hype over emails being sent to users of the Royal Bank of Scotland and NatWest because of severe IT issues making it impossible for users to access their accounts online. The emails offer users the ability to log-in to their accounts and provide a link to the […]

BlackShades in Syria

As reported by the Electronic Frontier Foundation (EFF) earlier this week, a new Trojan is being spread to Syrian activists in an attempt to employ electronic surveillance on the group and its members.  This Trojan is none other than the BlackShades RAT I blogged about last week as Part 2 of a series on different […]

1 2 3 4 5

Subscribe to our YouTube Channel