HackDig : Dig high-quality web security articles for hackers

Trickbot Malware Using Screen Resolution Checks as Anti-VM Tactic

Security researchers spotted Trickbot malware checking the screen resolution as a means of evading analysis on a virtual machine (VM).Digital security firm MalwareLab came across a sample of the trojan that checked to see whether a computer’s screen resolution was either 800×600 or 1024×768. It then terminated if it found that the screen reso
Publish At:2020-07-02 08:07 | Read:188 | Comments:0 | Tags:IT Security and Data Protection Latest Security News evasion

[SANS ISC] Malicious Excel With a Strong Obfuscation and Sandbox Evasion

I published the following diary on isc.sans.edu: “Malicious Excel With a Strong Obfuscation and Sandbox Evasion“: For a few weeks, we see a bunch of Excel documents spread in the wild with Macro V4. But VBA macros remain a classic way to drop the next stage of the attack on the victim’s computer. The attacker has many ways to fetch the next st
Publish At:2020-05-03 06:24 | Read:343 | Comments:0 | Tags:Malware SANS Internet Storm Center Security Evasion Obfuscat

Zepto Evasion Techniques

We’ve been tracking some more spam dropping Zepto ransomware variants. Like earlier posts, we’re seeing infected attachments with malicious macro scripts used as the entry point for the threat actor. (See images below of some recent spam samples.) As we dig deeper into our analysis, we found out that these macro scripts are not crafted manually.
Publish At:2016-11-21 23:35 | Read:9454 | Comments:0 | Tags:Featured Web threats donoff engine limitation evasion ransom

Post Office Email Scams Target Denmark, Drop Crypt0l0cker Ransomware

The post office email scam is a time-tested method of attack among malicious actors. Indeed, when users see that they have received an email from an actor purporting to be their local post office, most of them buy into the familiarity of this governmental institution and click on a link without taking the time to inspect the sender address. Attackers further
Publish At:2015-09-30 01:20 | Read:6470 | Comments:0 | Tags:Cyber Security Featured Articles crypt0l0cker evasion Heimda

Operation Poisoned Hurricane: Lessons for CISOs

The tactics described in “Operation Poisoned Hurricane” should come as a stark reminder that advanced threat actors do not stand still. They continue to refine their tradecraft, finding new and innovative ways to bypass security controls and evade detection. The technical details of the evasion techniques are complex, but the lessons for the CISO are clear:
Publish At:2014-08-09 22:28 | Read:3809 | Comments:0 | Tags:Advanced Threat Trends Security Perspective APT evasion kaba


Share high-quality web security related articles with you:)


Tag Cloud