Malware analysis May 29, 2014 Infosec A History of Malware: Part Three, 1993-1999 In my previous article, I explained what happened to the evolution of malware when microcomputers started to become a major presence in small offices and households....
Malware analysis May 19, 2014 Infosec A History of Malware: Part Two, 1989-1992 In my previous article, I told the story of the very first worms and viruses. Interestingly, a groundbreaking mathemetician, John von Neumann, and a science...
Malware analysis May 13, 2014 Infosec A History of Malware: Part One, 1949-1988 These days, malware is an everyday concern, even among ordinary end users. A countless amount of money is lost every year worldwide due to malware, possibly...
Malware analysis February 14, 2014 Darmawan Salihun NSA Backdoor Part 2, BULLDOZER: And, Learn How to DIY a NSA Hardware Implant This article is the second part of a series on NSA BIOS Backdoor internals. This part focuses on BULLDOZER, a hardware implant acting as malware dropper and...
Malware analysis January 31, 2014 Ajay Yadav Java bytecode reverse engineering This article is designed to show how to crack a Java executable by disassembling the corresponding bytes code. Disassembling Java bytecode is the act of transforming...
Malware analysis October 9, 2013 Aparajit i Portable Malware Lab for Beginners – Part 2 In the previous article, "Portable Malware Lab for Beginners," I spoke about nested virtual machines, i.e., deploying a virtual machine with QEMU and Cuckoo....
Malware analysis September 6, 2013 Steve Lynch The Hunt for Memory Malware Memory forensic is a skill to find out all the artifacts in the memory that is present in the running computer. It is an interesting method to find out what...
Malware analysis August 23, 2013 D12d0x34X From Unpacking to Communication Analysis Malwares are usually packed with custom packers, which make static and dynamic analysis difficult. Some of the static analysis tools do not work on packed samples...
Malware analysis July 8, 2013 Aditya Balapure Botnets Unearthed – The ZEUS BOT Zeus, also known as ZBot/WSNPoem, is famous for stealing banking information by using man in the browser keystroke logging and form grabbing. As the term suggests,...
Malware analysis May 7, 2013 Dimitar Kostadinov Gauss: Between technology and politics Introduction The purpose of this work is to present the reader research of the Gauss malware platform as one of the ultimate nation-state cyber exploitation...