HackDig : Dig high-quality web security articles

Hermit spyware is deployed with the help of a victim’s ISP

Google’s Threat Analysis Group (TAG) has revealed a sophisticated spyware activity involving ISPs (internet service providers) aiding in downloading powerful commercial spyware onto users’ mobile devices. The spyware, dubbed Hermit, is reported to have government clients much like Pegasus. Italian vendor RCS Labs developed Hermit. The spyware
Publish At:2022-06-29 07:53 | Read:531 | Comments:0 | Tags:Privacy Reports Android Apple C2 command and control commerc

What Is a Security Operations Center (SOC)?

Data breaches are costing organizations millions of dollars on average. In its 2020 Cost of a Data Breach Report, IBM found that a data breach cost the average organization $3.86 million. This price tag was even greater for organizations located in the United States and operating in the healthcare industry at $8.64 million and $7.13 million, respectively.Wha
Publish At:2021-06-17 04:53 | Read:1809 | Comments:0 | Tags:Incident Detection Command and Control cybersecurity policy

The MITRE ATT&CK Framework: Command and Control

Most malware these days has some level of Command and Control. This can be to exfiltrate data, tell the malware what instructions to execute next, or download encryption keys in the case of ransomware.In each case of command and control, the attacker is accessing the network from a remote location. Having insight into what is happening on the network is goin
Publish At:2020-06-10 11:03 | Read:2685 | Comments:0 | Tags:MITRE Framework ATT&CK Command and Control MITRE

Twittor – Backdoor Using Twitter For Command & Control

Twittor is a stealthy Python based backdoor using Twitter (Direct Messages) as a command and control server. This project has been inspired by Gcat which does the same but using a Gmail account.SetupFor this to work you need:A Twitter account (Use a dedicated account! Do not use your personal one!)Register an app on Twitter with Read, write, and direct messa
Publish At:2015-10-09 13:05 | Read:5615 | Comments:0 | Tags:Hacking Tools Programming backdoor command and control Pytho

Gcat – Python Backdoor Using Gmail For Command & Control

Gcat is a stealthy Python backdoor that uses Gmail as a command and control server. It’s fairly basic right now, but it’s an interesting proof of concept and if the community got behind it and contributed some new features it could be a pretty powerful piece of kit.Feature wise it doesn’t have that much, you can’t upload files yet, bu
Publish At:2015-09-12 04:15 | Read:6891 | Comments:0 | Tags:Hacking Tools Programming backdoor command and control gcat

Cryptowall 3.0 Slims Down, Removes Exploits From Dropper

A slimmed down version of Cryptowall is in circulation, and this one contains no built-in exploits, confirming a growing trend that most ransomware will be spread almost exclusively via exploit kits.Kits such as Angler, Nuclear, and most recently Hanjuan, have been busy incorporating Flash exploits dropping a mix of click-fraud malware and ransomware with gr
Publish At:2015-02-09 17:20 | Read:6854 | Comments:0 | Tags:Uncategorized Cisco Cisco Talos command and control Cryptowa

Matsnu Botnet DGA Discovers Power of Words

Domain generation algorithms have been botmasters’ favorite tool for keeping malware up and running—and for frustrating security researchers and detection technologies.Like malware, DGAs evolve, thus complicating an already tricky cat-and-mouse game between criminals and white hats.Related PostsRovnix Variant Surfaces With New DGAOctober 9, 2014 , 2:17
Publish At:2014-11-18 11:45 | Read:5242 | Comments:0 | Tags:Malware Web Security Aviv Raff backdoor Bayrob Botnets comma

Security Slice: Command and Control Evolution

Shape Security recently found a new strain of malware that executes a unique command and control attack. While these attacks are common, this one hides in unsent Gmail drafts, making it surprisingly difficult to detect.Will similar command and control evasion techniques target other unassuming programs?Listen to our latest security slice podcast and hear Tim
Publish At:2014-11-10 13:35 | Read:10142 | Comments:0 | Tags:Security Slice Command and Control Gmail malware Podcast

How bots and zombies work, and why you should care

We regularly write about "bots", or "zombies," malicious programs that let cybercriminals take over your computer from afar.Some malware is pre-programmed for one specific criminal act, such as ransomware that scrambles your data and demands a fee to get it back.But most bots or zombies are kitted out with a wide range of "features." Any of these can be cont
Publish At:2014-10-31 16:40 | Read:6167 | Comments:0 | Tags:Botnet Featured Malware botmaster botnet CnC command and con


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud