HackDig : Dig high-quality web security articles for hacker

Party like it’s 1999: Comeback of VBA Malware Downloaders [Part 3]

Authored by:  Clemens Kolbitsch, Alexander Sevtsov, and Arunpreet SinghFind more details on this series in Part 1 and Part 2.Evasive scripts continue to be on the rise - whether it’s in the form of VBA macros in Microsoft Office documents or in the form of JScript scripts, malware authors are equipping their campai
Publish At:2016-11-11 02:00 | Read:3232 | Comments:0 | Tags:Lastline Labs lastline vba vba downloaders

Party like it’s 1999: Comeback of VBA Malware Downloaders [Part 2]

Authored by: Alexander Sevtsov and Arunpreet SinghRead Part 1 here.The use of malicious macro code in Microsoft Office documents is seeing a big comeback in recent weeks. As we already discussed in the first part of this blog-post series, this malicious code gives attackers a very simple but powerful means to attack users. At the same time
Publish At:2016-10-06 15:15 | Read:3522 | Comments:0 | Tags:Lastline Labs lastline vba vba downloaders

Party like it’s 1999: Comeback of VBA Malware Downloaders [Part 1]

Authored by: Alexander Sevtsov and Arunpreet SinghMacro malware, introduced back in the 90’s, which lives inside Microsoft Office documents, is currently making a somewhat unexpected, but nonetheless frighteningly, successful comeback.The idea of infecting Internet users through documents is effective and incredibly simple, because all tha
Publish At:2016-08-31 20:40 | Read:2930 | Comments:0 | Tags:Lastline Labs lastline vba vba downloaders

DarkHotel APT Employs Just-in-Time Decryption of Strings to Evade Detection

For decades, the field of computer security has evolved as a cat-and-mouse game between security researchers and malware authors. When the former devises new methods to detect malicious programs, the latter incorporates into their software dormant functionality scenarios and a variety of other evasive techniques – four of which are now particularly common am
Publish At:2015-11-06 02:40 | Read:2949 | Comments:0 | Tags:Cyber Security Featured Articles APT DarkHotel Lastline malw

Four Common Scenarios for Dormant Functionality in Malware

Malware is continually evolving to meet the challenges posed by security researchers and antivirus software. Recently, malicious programs have begun to incorporate evasive behaviors, which include four of the most common anti-detection techniques: 1) environmental awareness, 2) confusing automated tools, 3) timing-based evasion, and 4) obfuscating internal d
Publish At:2015-08-28 01:10 | Read:3111 | Comments:0 | Tags:Cyber Security Featured Articles Black POS dormant functiona

4 Elements of a Stealthy Sandbox

Sandboxes (or automated, dynamic malware analysis systems) are one of the most advanced threat detection tools available to security professionals, and are quickly being adopted by forward-thinking enterprise and mid-market organizations globally.These systems use behavioral analysis methods to monitor unknown malware programs in a simulated environment for
Publish At:2015-04-08 08:35 | Read:2415 | Comments:0 | Tags:Featured Articles Incident Detection Lastline malware Sandbo

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud