HackDig : Dig high-quality web security articles for hacker

CSE CybSec ZLAB Malware Analysis Report: Petya

I’m proud to share with you the second report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy the Analysis Report Petya. CybSec Enterprise recently launched a malware Lab called it Z-Lab, that is composed of a group of skilled researchers and lead by Eng. Antonio Pirozzi. It’s a pleasure for me to share with you the
Publish At:2017-09-23 09:15 | Read:111 | Comments:0 | Tags:Breaking News Malware malware Malware Analysis Petya ransomw

CSE CybSec ZLAB Malware Analysis Report: NotPetya

I’m proud to share with you the first report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy the Analysis Report NotPetya. As most of you already know I have officially presented my new Co a couple of months ago, CybSec Enterprise is its name and we already started to work on strategic projects that we will reveal soon R
Publish At:2017-09-18 18:30 | Read:150 | Comments:0 | Tags:Breaking News Malware Reports malware Malware Analysis notpe

Just a Passing Fad? Fidget Spinners and the Malware Sandbox

This is the first installment in a three-part series about malware sandboxing. Stay tuned for more information. When the fidget spinner fad hit last year, my seventh grader was immediately on board and quickly became a fidget spinner snob, boasting about bearing quality and spin longevity. My fifth grader, however, eschewed fidget spinners with the same disd
Publish At:2017-08-29 10:15 | Read:239 | Comments:0 | Tags:Malware Threat Intelligence Advanced Malware Behavioral Anal

Using a Free Online Malware Analysis Sandbox to Dig Into Malicious Code

The continuous advancement and sophistication of cyberthreats has gradually decreased the sufficiency of traditional gateway and endpoint security solutions for protection against malware. These approaches were sufficient when malware occurred in small numbers and it was easy to differentiate between good and bad applications. Nowadays, there’s a world
Publish At:2017-08-28 12:55 | Read:250 | Comments:0 | Tags:Incident Response Malware Malware Analysis Sandbox Sandboxin

Hello, My Name Is Space Rogue

IBM X-Force Red marked its first-year anniversary with the addition of security specialists, including Space Rogue, who increases the team’s impressive roster of talent. Hello, my name is Space Rogue. Well, actually, it’s Cris Thomas, but the security community is most likely to recognize my work over the past two decades under my pseudonym. The
Publish At:2017-07-28 03:30 | Read:316 | Comments:0 | Tags:Application Security Security Services X-Force Research IBM

Petya Ransomware Initial Analysis

The document below is an initial level analysis of the recent Petya Ransomware (2017). We will also discuss an analysis of a dll variant of the ransomware.Ransomware Objective:Encrypt the target machine and ask for ransom (in Bitcoins) to decrypt it.Analysis Objective:First, this document does not contain all of the indicators but will explain the spec
Publish At:2017-07-27 00:15 | Read:277 | Comments:0 | Tags:Malware Analysis

Vault 7 Data Leak: Analyzing the CIA files

Digging the Vault 7 dumpsIn a first post on the Vault7 dump, we analyzed the information contained in files leaked by Wikileaks and allegedly originating from a network of the U.S. Central Intelligence Agency (CIA).At the time, we analyzed the following CIA projects:The Year Zero that revealed CIA hacking exploits for hardware and software.The Dark Mat
Publish At:2017-07-20 20:35 | Read:292 | Comments:0 | Tags:Malware Analysis

The Limits of Linguistic Analysis for Security Attribution

Everyone wants to know who was behind the latest audacious cyberattack. Security professionals have long attempted to identify threat actors through linguistic analysis, but this method is limited when it comes to attribution. Part of the problem is that cybercriminals purposely build deception mechanisms into their code. “Deception is always a major
Publish At:2017-07-14 17:35 | Read:283 | Comments:0 | Tags:Network Risk Management Malware Malware Analysis Programming

Which Malware are Specifically Designed to Target ISC Systems?

Introduction – ICS malware, a rarity in the threat landscapeAt the end of May, security experts discovered a seven-year-old remote code execution vulnerability affecting all versions of the Samba software since 3.5.0. The flaw has been promptly fixed by the maintainers of the project. The vulnerability, tracked as CVE-2017-7494, can be exploited by an
Publish At:2017-06-20 22:20 | Read:618 | Comments:0 | Tags:Malware Analysis

More Bypassing of Malware Anti-Analysis Techniques

For last few articles, we have seen how malware employs some anti-analysis techniques and how we can bypass those techniques. Now, let’s raise the bar a bit more and look out for more advanced anti-analysis techniques.In this article, we will look at how we can reach the Original Entry Point of a packed Exe and then how malware can trick to overr
Publish At:2017-06-14 00:35 | Read:346 | Comments:0 | Tags:Malware Analysis

SambaCry: Hundreds of thousands of Linux systems exposed to a campaign that delivers cryptocurrency miner

CVE-2017-7494 – A Samba seven-year-old remote code execution vulnerabilityAt the end of May, security experts discovered a seven-year-old remote code execution vulnerability affecting all versions of the Samba software since 3.5.0. The flaw has been promptly fixed by the maintainers of the project. The vulnerability, tracked as CVE-2017-7494, can
Publish At:2017-06-12 11:45 | Read:357 | Comments:0 | Tags:Malware Analysis

Malware Anti-Analysis Techniques-TLS and Process Hallowing

In continuation to previous articles, this article will also show a more sophisticated approach used by malware to thwart anti-analysis techniques.Let’s start the analysis of sampleTLS.exeAs soon as I load the sample into OllyDBG for debugging, it is in paused state, but when I look into process hacker, there is an instance already started runnin
Publish At:2017-06-07 21:15 | Read:494 | Comments:0 | Tags:Malware Analysis

Malware-as-a-service

Section 1. IntroductionIn May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries. The ransomware affected organizations, such as Deutsche Bahn AG (a German railway company), NHS Scotland (the publicly funded healthcare system in Scotland), National Health Service of England, S
Publish At:2017-06-05 13:50 | Read:541 | Comments:0 | Tags:Malware Analysis

Security in Dog Years, Malware Analysis in Minutes

A few weeks ago, the security community had its security blanket ripped firmly away as the WannaCry ransomware ripped through hospitals, rail systems, telecommunication companies and more as it made its way around the globe. While the dust settles and researchers figure out the initial infection vector and develop recommendations for preventing future inci
Publish At:2017-06-01 11:15 | Read:605 | Comments:0 | Tags:Incident Response Malware Threat Intelligence Advanced Malwa

Simplifying Malware Analysis for the C-Suite and Security Operations

The recent WannaCry ransomware infections demonstrate an immediately known threat, but what about attacks that aren’t immediately identifiable and require deeper malware analysis? Imagine this scenario: A chief executive officer (CEO) and a chief information officer (CIO) sit and listen in disbelief as they hear that their company was attacked four mon
Publish At:2017-05-17 02:50 | Read:627 | Comments:0 | Tags:CISO Malware C-Suite IBM X-Force Research Malware Analysis N

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud