Clear Text

Threat Research

Saturday, January 16, 2016

On-Site Procurement

›
One of my favorite movie trilogies is the Bourne Trilogy. The Bourne Identity, The Bourne Supremacy and The Bourne Ultimatum (I don’t count ...
Saturday, October 10, 2015

Shifu - Advanced Malware

›
Shifu - Advanced Malware The Shifu Trojan is a recently discovered malware involved in a number targeted attacks involving the Japan...
Thursday, April 2, 2015

A Closer Look at DGA Traffic

›
Our last post explored a technique used by malware authors to subvert Command and Control server discovery. CryptoLocker was one such malwa...
Wednesday, March 4, 2015

Malware Technique: DGA

›
Persistence is key to an adversary's attempts to compromise a target. It is very important to establish a foothold so that continued acc...
Sunday, February 22, 2015

Malware Technique: DLL Side Loading

›
Malware authors often rely on vulnerabilities as a stepping stone to infect or compromise the hosts they target. Within the scope of malware...
Wednesday, December 3, 2014

Amazon Order Confirmation Phishing Campaign - Part III

›
In our previous post , we analyzed a malicious word document and it's associated macro. Our analysis revealed that this macro is used to...
Wednesday, November 19, 2014

Amazon Order Confirmation Phishing Campaign - Part II

›
In the last post I reviewed a phishing campaign that used spoofed Amazon.co.uk confirmation emails to bait recipients in to opening a Word ...
2 comments:
›
Home
View web version

About Me

Clover
Information Security researcher and enthusiast.
View my complete profile
Powered by Blogger.