A few days ago, an advertisement for a zero-day vulnerability in Firefox for Android appeared on Inj3ct0r, an exploit database.
The author, “fil9″, was just registered to the site last month, and claims the exploit works on Firefox versions 23/24/26(Nightly) for Android.
You might have already heard that last month’s traffic within the Tor network saw a significant increase. Over 1.2 million users during the month of August to be exact–that’s more than twice the amount of average traffic going through their network.
Tor, sometimes referred to as the “onion-routing” network, exists as a volunteer effort to conceal the identity of its users.
Conversely, Tor has also been used by criminals to peddle wares and offer illegal services. Continue reading
If you’ve been reading the news lately, you’ve probably noticed the New York Times (NYT) website was defaced just two days ago on August 27th. On that same day, The NYT made comments concerning the attack in their blog after the website was restored.
Rich Matteo, a researcher here at Malwarebytes, came across an interesting sample that erases files and leaves a not-so-friendly message to its victims.
Once a host PC is infected, the malware enumerates the victim and looks for files of a certain type, replacing their contents with “Because f*** you! That’s why.”
Naturally, this can cause many programs to cease functioning, one of which was my Malcode Analyst Pack. This one produced some rather comical errors post infection.
Recently, I posted a blog about analyzing PDF files. In that post, we covered some basics of the PDF format and then examined an infected PDF to observe the malware infection.
In this post, we’re going to do something similar, except this time using Microsoft Office.
Just like the PDF, most of you reading this are already familiar with Microsoft Office. If you’ve ever had to Continue reading