Categories

Category Archives: Malware Analysis

The nitty-gritty technical details from our malware researchers and developers about all the nastiest malware out there.

Five PE Analysis Tools Worth Looking At

In the world of malware analysis, having the right tools can make all the difference. Fortunately, there are many to choose from.

Automating Malware Analysis with Cuckoo Sandbox

Cuckoo Sandbox is a powerful tool used for rapid analysis of malicious files.

Malware with Packer Deception Techniques

Find out how malware fools common file scanners.

Observing COM within Malicious Code

How malware leverages the Component Object Model

Using Good Code for Bad Things

See how malware takes good code and makes it bad.

How to Unpack a Self-Injecting Citadel Trojan

A ‘how-to’ guide on unveiling the Citadel Trojan’s code.

A Look at Malware with Virtual Machine Detection

What you can do against malware with Virtual Machine detection.

Process Explorer Now Including VirusTotal Support

The popular Process Explorer program from Sysinternals now includes VirusTotal support.

Revealed: POS Malware Used in Target Attack

Target POS malware used during holiday attack was a ram scraper known by Symantec as “Reedum”.

Miner Madness!

How real malware tactics are being used to steal your system resources via miners.

badBIOS: Jumping the Gap

Can malware infect the deepest parts of a computer, knows when you’re looking for it and communicates over high-frequency speaker sounds?

If you’re still looking for that last-minute costume, careful where you shop as drive-by download can happen while browsing a Halloween online store.

Hiding in plain sight

A lot of programs we install on our computer are automatically run when Windows starts. But this behavior is also copied by malware writers to pass security checks.

Using YARA to attribute malware

Malware researchers use a lot of tools in their arsenal to dissect malware. YARA can help to quickly and easily identify malware.

Cryptolocker Ransomware: What You Need To Know

Cryptolocker is a nasty ransomware that encrypts infected users’ personal files. Using Malwarebytes Anti-Malware Premium will keep you safe.

In computers, are random numbers really random?

Computers do not work easily with truly random numbers and it pays off to understand how pseudo-random numbers are used and created.

Lock-Unlock, Biometric adventures, part 2

A follow-up on the updated SignWave Unlock Free by Battelle for Leap Motion on Windows and the new Mac version.

New Solarbot Malware Debuts, Creator Publicly Advertising

A new botnet known publicly as “solarbot” has been making its rounds, according to a report from ESET. Image:ESET In their writeup, ESET analysts explain that solarbot(which they refer to as Win32/Napolar) is capable of: Denial of Service (DOS) attacks Behave as a SOCKS proxy server Stealing information from web forms

Click2Play exploit paired with CVE-2013-2460 guarantees the highest infection rates for anyone running Java 7 update 21 or earlier. But not if you have Malwarebytes Anti-Exploit.

Ransomware Puts Your System To Work Mining Bitcoins

Newer version of the Reveton ransomware uses Bitcoin mining to always makes a profit, regardless if the users are willing to pay, or not pay, the ransom.

Next Page »

Subscribe to our YouTube Channel