Malware analysis March 3, 2016 Security Ninja Complete Tour of PE and ELF: An Introduction I have decided to come up with an end-to-end malware analysis course and even extend it to memory forensics and detecting APT's. Though this might sound great,...
Malware analysis March 1, 2016 Pierluigi Paganini The Zero-Days Documentary A new documentary titled Zero Days recently presented at the Berlin Film Festival provided further details on the intelligence operations that led to the Stuxnet...
Malware analysis February 22, 2016 Pierluigi Paganini PoS Malware: All You Need to Know PoS malware continues to be a serious threat to several industries, from retail to the hotel industry. Respect our previous post, the number of attacks increased...
Malware analysis February 11, 2016 Security Ninja How Malware Detects Virtualized Environment (and its Countermeasures) Virtual Machines are usually considered a good way to analyze malware as they can provide an isolated environment for the malware to trigger but their actions...
Malware analysis January 27, 2016 Frank Siemons SQL Injection Analysis Skillset Labs walk you through infosec tutorials, step-by-step, with over 30 hands-on penetration testing labs available for FREE! ...
Malware analysis January 12, 2016 Pierluigi Paganini BlackEnergy Used as a Cyber Weapon Against Ukrainian Critical Infrastructure Recently the researchers at ESET firm spotted a new wave of malware-based attacks that are targeting media outlets and energy companies in Ukraine. The threat...
Malware analysis December 23, 2015 Revers3r Malware Researcher’s Handbook (Demystifying PE File Part 2) As per our previous article we will continue on this article here by the rest of section of PE file. Those who don't know the previous section please have...
Malware analysis December 9, 2015 SecRat Reversing the Pony Trojan part II Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://threatpost.com/latest-instance-of-pony-botnet-pilfers-200k-700k-credentials/104463/)...
Malware analysis December 3, 2015 Souhail Hammou A Case Study of Information Stealers: Part I A stealer is a type of malware that looks for passwords stored on the machine and sends them remotely (e.g. mail, HTTP) to an attacker. Most stealers use a...
Malware analysis November 23, 2015 SecRat Reversing the Pony Trojan Part I Pony is a stealer Trojan and has been active for quite a while now. It was responsible for stealing over $200,000 in bitcoins ( https://threatpost.com/latest-instance-of-pony-botnet-pilfers-200k-700k-credentials/104463/)...