HackDig : Dig high-quality web security articles for hacker

Breaking The Weakest Link Of The Strongest Chain

Around July last year, more than a 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices were pushed Trojan updates, which allowed the attackers to extend their capabilities. The operation remains active at t
Publish At:2017-02-16 16:40 | Read:3007 | Comments:0 | Tags:Blog Featured Incidents Mobile Attacks Obfuscation Social En

De-obfuscating malicious Vbscripts

Although they were never really gone, it looks like there is a rise in the number of malicious vbscripts in the wild. Maybe the similarity to VBA scripts and possible use in macros is responsible for the increased popularity. Let’s have a quick look at a few of them. First some background VBScript has been installed with every desktop version of Windows sin
Publish At:2016-03-01 14:45 | Read:2944 | Comments:0 | Tags:Malware Analysis banker clicker de-obfuscate decrypt dropper

The Role of Deliberate Obfuscation for Overall Data Security and Privacy

A new book by two New York University professors offers a fresh perspective on how individuals and corporations can hide their more private information in plain sight. The book, “Obfuscation: A User’s Guide for Privacy and Protest,” surveys the more interesting historical examples of the notion and provides some interesting context for prac
Publish At:2015-11-13 15:25 | Read:2427 | Comments:0 | Tags:Data Protection Data Security Honeypot Obfuscation Privacy R

DARPA even more interested in software Obfuscation Solutions

DARPA is sustaining researchers to seek innovations in software obfuscation solutions to contrast criminals that try to reverse engineer software. DARPA (Defense Advanced Research Project Agency) and a team of researchers are turning towards new methods to overcome reverse engineering by using obfuscation to secure government
Publish At:2015-09-16 21:55 | Read:1653 | Comments:0 | Tags:Breaking News Security DARPA Hacking Obfuscation Pierluigi P

DARPA Protecting Software From Reverse Engineering Through Obfuscation

Researchers with a DARPA-led team are looking into new ways to combat reverse engineering by using obfuscation to tidy up shoddy commercial and government security.Researchers with the unit, dubbed the SafeWare program, are hoping to develop new methods, bolstered by encryption, to obscure software code in hopes it its further deployment can lead to “p
Publish At:2015-09-14 16:25 | Read:2446 | Comments:0 | Tags:Cryptography Government Vulnerabilities DARPA obfuscation re

New Hammertoss Espionage Tool Tied to MiniDuke Gang

The espionage gang behind the MiniDuke backdoor uncovered by Kaspersky Lab and CrySys Lab in 2013 has surfaced again with a new backdoor and attack platform that is used sparingly against only high-value targets.The new data theft tool, called Hammertoss, is a study not only in espionage capabilities, but also stealth and targeting. It’s been found so
Publish At:2015-07-29 20:05 | Read:1710 | Comments:0 | Tags:Cryptography Government Malware Privacy Web Security apt APT

Spam with a malicious taste

Spam with a malicious taste I haven’t seen in a while a well done complex spam with malicious payload.This one appears to be addressed to first name of the email recipient. As you can see in the subject, it is addressed to “SORIN” since my email address is sorin.musta
Publish At:2015-03-01 17:50 | Read:2719 | Comments:0 | Tags:Expert Views Sorin Mustaca court Javascript notice obfuscati

12 Days of HaXmas: Improvements to jsobfu

This post is the third in a series, 12 Days of HaXmas, where we take a look at some of more notable advancements and events in the Metasploit Framework over the course of 2014. Several months ago, Wei sinn3r Chen and I landed some improvements to Metasploit's Javascript obfuscator, jsobfu. Most notably, we moved it out to its own repo and gem, wrapped i
Publish At:2014-12-28 00:45 | Read:2684 | Comments:0 | Tags:js jsobfu javascript obfuscation av gems haxmas

Ahoy! It's the Metasploit Weekly Wrapup: More on Android UXSS and refreshing JSObfu

First things first -- today is International Talk Like a Pirate Day, which is great for me, given my office decor. Arrr! So grab a flagon of grog, and read on, ye landlubbers! Updates to the Android Universal XSS bug (CVE-2014-6041)This has been a pretty busy week for us here in Metasploit Nation. You probably heard about Rafay Baloch's kind of massive
Publish At:2014-09-19 20:50 | Read:2648 | Comments:0 | Tags:android javascript jsobfu obfuscation uxss weekly-update Xss

Fresh phish served with a helping of AES

Obfuscated phishing sites are nothing new. Various techniques such as JavaScript encryption tools (which offer very primitive obfuscation), data URIs (where the page content is mostly Base64-encoded), and character escaping are often used. However, recently we have seen a phishing site using the Advanced Encryption Standard (AES).Figure 1. Page s
Publish At:2014-09-04 15:10 | Read:2450 | Comments:0 | Tags:Security Security Response Endpoint Protection (AntiVirus) A

Obfuscated malicious office documents adopted by cybercriminals around the world

After going out of fashion for a number of years, malicious macros inside Office files have recently experienced a revival. And why not, especially if they are a lot cheaper than exploits and capable of doing the same job? Yes, that's right, cybercriminals are busily recycling this old technique, introducing new obfuscation forms to make it more effective. L
Publish At:2014-08-10 13:33 | Read:4332 | Comments:0 | Tags:Blog Research Banker Base64 Email Excel Macro Microsoft Word

An Analysis of PlugX Using Process Dumps from High-Resolution Malware Analysis

Targeted attacks and so-called APTs (advanced persistent threats) come in many forms and colors. Very often, in-house malware analysis teams want to go beyond the detection information offered by traditional analysis systems (which often only says if a program looks malicious or not). The Lastline High-Resolution analysis engine exposes a lot of details desc
Publish At:2014-08-09 12:42 | Read:3320 | Comments:0 | Tags:Dynamic Malware Analysis Obfuscation PlugX


Share high-quality web security related articles with you:)


Tag Cloud