Categories

Category Archives: Malware Analysis

The nitty-gritty technical details from our malware researchers and developers about all the nastiest malware out there.

A researcher at Malwarebytes came across an interesting malware sample that erases files and leaves a not-so-friendly message to its victims.

The Malware Archives: MS Office Files

A deeper look at Microsoft Office malware infections.

An Exploit for Mozilla’s Firefox version 17 is making headlines, not simply because it is a zero-day but mainly because it appears to be part of a U.S. government program to uncover the identity of people using the Tor Browser to view child pornography.

Adobe Reader has a history of vulnerabilities and gets exploited quite a bit. Once exploitation succeeds, a malware payload can infect a PC using elevated privileges. For these reasons, it’s good to know how to analyze PDF files

Sophos Discovers ZeroAccess Using RLO

Yesterday, analysts at SophosLabs looked at a new ZeroAccess variant using some new tricks to hide itself. Or should I say old ones, which are seemingly rediscovered.

SMS Scams: How To Defend Yourself

Cyber-crooks are spamming through every avenue they can, hoping to lure their victims into revealing personal information or tricking them with scam SMS text messages.

ZeroAccess uses Self-Debugging

In the field of malware analysis, debuggers are a vital tool used to reverse-engineer malware binaries, helping analysts to understand the purpose and functionality of malware when dynamic analysis isn’t enough.

How to encrypt your email

Given recent worries about data-leaks and other privacy issues, it might be handy to have some tools to make it harder for third parties to unravel your data. One such method is encryption.

Apple’s OS X FBI Ransomware Goes Global

Further customizations of the Mac ransom pages discovered today shows the bad guys are busy updating their templates for each country’s police force.

Bi-Directional Trickery, (╯°□°)╯︵ oןɹ

Malware authors are known to try various obfuscation techniques in order to hide their malware. The Unicode Right-to-Left trick (RLO), which has been known for quite some time, has been reported again by security firm F-Secure, showing its resurgence.

My Memory Isn’t What It Used To Be: Part 2

How malware can use process memory to its advantage part 2.

DDOS, the doorbell ditch of cybercrime

This morning, Michael Callahan of Juniper Networks posted an article on SecurityWeek.com about distributed denial of service, or DDOS, called “Take a Broader, Deeper, Wider Bite out of Cybercrime.” A DDOS attack is when numerous client systems send massive amounts of network traffic to a single web server in the hopes of making it impossible […]

Seven tips to keep your PC safe this summer

Whether you’re lost on a road trip, going deaf at a rock concert, or getting your sun tan on, odds are PC security isn’t the first thing on your mind as you enter this summer season.

My Memory Isn’t What It Used to Be: Part 1

When analyzing malware, what you see on disk is oftentimes not an accurate representation of what’s actually happening in memory.

Awareness and education about online dangers is essential but headlines like “Malware That Drains Your Bank Account Thriving On Facebook” instill fear while at the same time blame Facebook — something that may not be entirely justified.

What are Trojans?

Computer Trojans, like the mythical horse of the Trojan war, often disguise themselves as something useful or at least innocent. Once inside, however, they often download and install other vicious malware.

Brazilian Facebook Trojan and Consumer Security

New Facebook trojan Febipos is currently active in Brazil and takes control of your Facebook profile using a Firefox and/or Chrome extension that’s installed during execution.

Malware today is so numerous and diverse that security professionals have known for some time that signature based solutions would no longer be able to cut it alone. Not only are there too many new malware files each day, some of them are able to change their shape and signature as they go along. But,if […]

Nowhere to Hide: Three methods of XOR obfuscation

A couple of months ago, I did an article on generic obfuscation techniques used to hide malware.  It continues to be no surprise that malware tries to hide using an array of techniques that are easy to implement. I wanted to elaborate on one of those techniques I mentioned earlier, which was the exclusive or […]

Malware in a Jar

As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery.  This year has been a shaky start for the cross-platform web technology, where it seems the number of documented vulnerabilities is hard to number. If you recall in January, we saw a zero-day later found […]

1 2 3 4 5

Subscribe to our YouTube Channel