Clear Text
Threat Research
Saturday, January 16, 2016
On-Site Procurement
›
One of my favorite movie trilogies is the Bourne Trilogy. The Bourne Identity, The Bourne Supremacy and The Bourne Ultimatum (I don’t count ...
Saturday, October 10, 2015
Shifu - Advanced Malware
›
Shifu - Advanced Malware The Shifu Trojan is a recently discovered malware involved in a number targeted attacks involving the Japan...
Thursday, April 2, 2015
A Closer Look at DGA Traffic
›
Our last post explored a technique used by malware authors to subvert Command and Control server discovery. CryptoLocker was one such malwa...
Wednesday, March 4, 2015
Malware Technique: DGA
›
Persistence is key to an adversary's attempts to compromise a target. It is very important to establish a foothold so that continued acc...
Sunday, February 22, 2015
Malware Technique: DLL Side Loading
›
Malware authors often rely on vulnerabilities as a stepping stone to infect or compromise the hosts they target. Within the scope of malware...
Wednesday, December 3, 2014
Amazon Order Confirmation Phishing Campaign - Part III
›
In our previous post , we analyzed a malicious word document and it's associated macro. Our analysis revealed that this macro is used to...
Wednesday, November 19, 2014
Amazon Order Confirmation Phishing Campaign - Part II
›
In the last post I reviewed a phishing campaign that used spoofed Amazon.co.uk confirmation emails to bait recipients in to opening a Word ...
2 comments:
›
Home
View web version