OFFICIAL SECURITY BLOG

Category Archives: Malware Analysis

The nitty-gritty technical details from our malware researchers and developers about all the nastiest malware out there.

Malware in a Jar

April 3, 2013 | BY

As researchers find more security flaws in Oracle Java, the software continues to be used for exploitation and malware delivery.  This year has been a shaky start for the cross-platform web technology, where it seems the number of documented vulnerabilities is hard to number. If you recall in January, we saw a zero-day later found […]

Malwarebytes Hit by Targeted Attack!

April 1, 2013 | BY

Dear Readers, We regret to inform you that over the weekend, Malwarebytes was under direct, targeted attack from a new type of malware of unknown origin. The malware was shutting down systems left and right at our headquarters. We were able to cut off its spread through our network and obtain a sample of it […]

High Exposure

March 14, 2013 | BY

Bill Gates is the latest victim of a series of hacks targeting celebrities and getting their private information exposed to the world. A group of hackers who already published Social Security Numbers, Credit Reports and banking details, addresses etc. for several other high profiles, is still enjoying an undisrupted run. Equifax recently confirmed being breached […]

Law Against Cookies

February 20, 2013 | BY

In May  2011 the European Union changed the law that covers the use of electronic communications networks to store information, e.g. using cookies, or gain access to information stored in the terminal equipment of a subscriber or user. One year later, in May 2012 the law was updated in the sense that implied consent was […]

Text Popups

February 13, 2013 | BY

What is a text popup? A text popup is a link that opens a popup box containing advertisements, usually prompted by a mouse-over. Where do they come from? As a moderator on a few forums and as an amateur web-designer, I often get complaints from people asking me to remove the annoying text popups or […]

Tools of the Trade: Exploit Kits

February 11, 2013 | BY

Exploit Kits are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide.  Exploit kits distributed currently through both public and underground sources appeal to a wide range of audiences, from inexperienced hackers to seasoned “black hat” cybercriminals.  Perhaps you or someone you know may have heard about […]

Sandbox Sensitivity

February 5, 2013 | BY

This article is meant to give you an overview of how sandboxes are used and why malware writers try to avoid their code to run on them. It will also list some methods that are in use to make malware sandbox-sensitive. Without going into much detail it will also give you an idea of the […]

Digital certificates and malware: a dangerous mix

February 4, 2013 | BY

Update (Feb 6th): The digital certificates have been revoked by DigiCert. Update (Feb 4th, 3:44 PM): Egnyte has promptly taken down the illicit account following our call. However, digital signature is still in use. In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If […]

Malwarebiter – Biting down on you

January 30, 2013 | BY

UPDATE: As of 1/28, the Facebook page for Malwarebiter appears to have been deleted. Overview A few days ago Malwarebytes Intelligence Analyst Adam Kujawa released a Cyber-Threat Advisory on a fairly new anti-malware product on the web called “Malwarebiter”.  This product grabbed our attention because of its similar name to Malwarebytes.  

CTA: Unpatched Java Exploit in the Wild

January 10, 2013 | BY

URGENT: New Java Exploit being used to infect Updated Users. ACTION: Disable Java Browser Plugin using: http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ http://krebsonsecurity.com/how-to-unplug-java-from-the-browser/ DETAILS: As of yesterday, a new Java exploit has been developed and released to the cyber-crime community. It is currently in the wild and being used to distribute malware such as the Reveton Ransomware.

Web Exploits: a bright future ahead

January 2, 2013 | BY

The majority of computers get infected from visiting a specially crafted webpage that exploits one or multiple software vulnerabilities. It could be by clicking a link within an email or simply browsing the net, and it happens silently without any user interaction whatsoever. Vulnerabilities are flaws that exist in various programs and that allow someone to […]

Misleading advertising

December 20, 2012 | BY

Today we are going to be talking about advertising, specifically misleading advertising. Whether it’s on TV or on the internet, in magazines and newspapers, we see misleading advertising all of the time, you see it all of the time, whether you realize it or not. So how do you spot it? Well, that is one […]

Ransomware

December 7, 2012 | BY

…because some malware is too heinous for clever puns. Ransom software or Ransomware, takes advantage of our constant need for information, communication and entertainment by hijacking our computer systems and demanding payment for returned use.  It hides under the masks of government agencies and uses tactics similar to criminal interrogations to guilt the user into […]

1 2 3 4 5