OFFICIAL SECURITY BLOG

Category Archives: Malware Analysis

The nitty-gritty technical details from our malware researchers and developers about all the nastiest malware out there.

Pick A Download… Part 2

October 26, 2012 | BY

Last week I wrote a blog post on the dangers of ads posing as fake download buttons on various download web sites. Since then I received a lot of feedback from our readers and other security researchers on different tools available to help users avoid these dangers by blocking the ads entirely.  Instead of adding […]

Timely detection: the key to a good anti-malware solution

October 22, 2012 | BY

In this connected world, time is of the essence. The bad guys are counting on releasing their malicious programs and infecting machines before security companies have time to analyze those samples and provide detection signatures to block the threat. Although antivirus companies have evolved their technologies and can now provide proactive heuristic detections (essentially this […]

Pick a Download, Any Download!

October 19, 2012 | BY

Various download sites have been plastering ads all over their pages for years, some of which are just for other types of software and some of them are for services. However, a new trend among these ads has emerged, adding an extra download button where there should not be one.  Many users have been falling […]

A Picture is worth a Thousand Messages

October 12, 2012 | BY

Instant messaging is not a new concept; in fact, instant messaging software has been around for over 20 years in many different forms.  A more popular method of instant messaging these days is done with the use of the software known as Skype.  Skype allows for more than just text chatting but also calling a […]

Dark Comet 2: Electric Boogaloo

October 5, 2012 | BY

Over the past few weeks Jean-Piere Lesueur, A.K.A. DarkCoderSc, has been developing a new version of the Dark Comet Remote Administration Tool which he is calling “Dark Comet Legacy.” This newer version of the tool includes numerous features that make the tool more user-friendly and appear more legitimate.  In addition, DarkCoderSc continues to include notices […]

Much Ado About Browser Malware

September 24, 2012 | BY

Browser Malware is a constant problem for all computer users. In addition to being highly intrusive and sometimes difficult to remove, it is one of the most frequently modified types of malware currently in the wild; because of this, Anti-Malware and antivirus products may not detect and remove all new variants of browser infecting malware […]

So You Want To Be A Malware Analyst

September 18, 2012 | BY

In war, there are always two sides: the attackers and the defenders.  A less focused on group is the researchers and developers.  While soldiers are fighting a war on the front lines, scientists and engineers are researching and developing new weapons, defenses and tools; things that give their side an advantage.  If one of these […]

Call Me Phishy

September 7, 2012 | BY

A few months ago, I did a series on Phishing, called Phishing 101. In it, I described various ways in which cyber-criminals are trying to steal information by swindling users with fake web sites, social network spamming and even lures in video games.  This week I wanted to touch on a method that has been […]

Passing The BitCoin

August 24, 2012 | BY

BitCoin is a new-ish form of digital currency.  It allows people to perform financial transactions without the need for a bank or central authority and allows for a large amount of privacy.  Transactions are currently limited to ones performed online and only by individuals and organizations that accept BitCoin as payment. However, in the next […]

ALERT: New Bank Phishing Attempts

August 6, 2012 | BY

A new phishing scam is going around and trying to grab user log-on credentials  for popular banks like HSBC, Lloyds TSB & Chase. The phishing emails advertise one of the following reasons in order to trick the user into clicking the provided link: There are security Messages available to the user which they  need to […]

Malwarebytes @ DefCon: The Wrap-Up

July 30, 2012 | BY

As mentioned last week, the Malwarebytes crew made it out to DefCon this year to check out all of the interesting talks and presentations given by various members of the computer/intelligence security community. This blog is meant to summarize most of what we saw, giving a brief explanation of which talks we thought were the […]

The Malware That I Used To Know

July 25, 2012 | BY

Malware, much like all weapons, evolve based upon multiple factors, be it the protections of their intended target, the weapon operator and their organization or the general intent that it was created for.  Unlike most weapons though, malware evolved with a pattern closer to that of a biological disease.  Early variants were created and most […]

Phishing 101: Part 3

July 13, 2012 | BY

Over the last few weeks I have described numerous methods of phishing attacks and a few examples what they do or may look like.  In this final installment, I will shed some light on how phishing attacks are done and a few real world examples of techniques used by Phishing scammers.  Finally, I will discuss […]

BlackShades Co-Creator Arrested!

July 4, 2012 | BY

Last week, it was announced that one of the creators of BlackShades NET Remote Access Trojan was arrested along with 23 others in an international assault against cybercrime. As you recall from previous blogs posted on Unpacked, we have given you, the reader, an in-depth look into what kind of dangers are presented by the […]

Phishing 101: Part 2

July 3, 2012 | BY

“Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me If there is one thing you can say about cybercriminals, it’s that they are adaptive. As I mentioned last week, phishing attacks have evolved from just fake web pages and official looking emails to […]

1 2 3 4 5