HackDig : Dig high-quality web security articles for hacker

Automatic Extraction of Data from Excel Sheet

Excel sheets are very common files in corporate environments. It’s definitively not a security tool but it’s not rare to find useful information stored in such files. When these data must be processed for threat hunting or to collect IOC’s, it is mandatory to automate, as much as possible, the processing of data. Here a good example: Everyd
Publish At:2017-10-24 21:20 | Read:2994 | Comments:0 | Tags:Software Unix Automation Excel Python Script Tool

It’s 2016, so why is the world still falling for Office macro malware?

In the late 1990s, Microsoft Office macros were a favorite vehicle for surreptitiously installing malware on the computers of unsuspecting targets. Microsoft eventually disabled the automated scripts by default, a setting that forced attackers to look for new infection methods. Remotely exploiting security bugs in Internet Explorer, Adobe Flash, and other wi
Publish At:2016-03-04 18:40 | Read:4854 | Comments:0 | Tags:Risk Assessment Technology Lab Excel exploits macros malware

Dridex Is Back, then it’s gone again

This post was authored by Armin Pelkmann and Earl Carter.Talos Security Intelligence and Research Group noticed a reappearance of several Dridex email campaigns, starting last week and continuing into this week as well. Dridex is in a nutshell, malware designed to steal your financial account information. The attack attempts to get the user to install the ma
Publish At:2014-12-09 18:55 | Read:3510 | Comments:0 | Tags:Threat Research Dridex Excel financial malware Microsoft sec

Obfuscated malicious office documents adopted by cybercriminals around the world

After going out of fashion for a number of years, malicious macros inside Office files have recently experienced a revival. And why not, especially if they are a lot cheaper than exploits and capable of doing the same job? Yes, that's right, cybercriminals are busily recycling this old technique, introducing new obfuscation forms to make it more effective. L
Publish At:2014-08-10 13:33 | Read:5879 | Comments:0 | Tags:Blog Research Banker Base64 Email Excel Macro Microsoft Word


Share high-quality web security related articles with you:)


Tag Cloud