HackDig : Dig high-quality web security articles for hacker

Fileless Infections: An Overview

To date, there are a number of so-called fileless infections. By fileless infections or fileless malware, we are referring to an infection or malware that does not write any files to the infected system’s hard drive. By leaving as little traces behind as possible, malware authors try to postpone detection by security vendors for as long as possible. Which is
Publish At:2016-03-30 07:45 | Read:3872 | Comments:0 | Tags:Cybercrime Malware Security Threat exploit fileless kovter p

Without a Trace: Fileless Malware Spotted in the Wild

Improvements in security file scanners are causing malware authors to deviate from the traditional malware installation routine. It’s no longer enough for malware to rely on dropping copies of themselves to a location specified in the malware code and using persistence tactics like setting up an autostart feature to ensure that they continue to run. Se
Publish At:2015-04-20 16:50 | Read:4718 | Comments:0 | Tags:Malware fileless fileless malware Phasebot POWELIKS XswDownl

Registry Dumper – Find and Dump Hidden Registry Keys

The cybercriminals behind Poweliks implemented two clever techniques in their malware. The first was leveraging rundll32.dll to execute Javascript and the second was using a method to hide/protect their registry keys. I’ll be focusing on the second method. The technique of hiding/protecting registry keys using a non-ASCII character goes all the way b
Publish At:2014-12-06 23:50 | Read:5252 | Comments:0 | Tags:Malscript Tools poweliks regdumper regedit registry

Windows Registry Infecting Malware Has NO Files

This is a pretty interesting use of the Windows Registry and reminds me a little of the transient drive-by malware used last year against Internet Explorer that left no files either – Another IE 0-Day Hole Found & Used By In-Memory Drive By Attacks.The main difference being, that wasn’t persistent and as it lived in RAM, it wouldn’t su
Publish At:2014-08-15 09:48 | Read:3127 | Comments:0 | Tags:Malware Windows Hacking CVE-2012-0158 poweliks rascagneres r

Poweliks the persistent malware which doesn’t install any file

Experts at GData discovered Poweliks, a persistent malware able to infect machines without installing any files on the targeted machine. Researchers at GData software have discovered a new surprising strain of malware named Poweliks which is able to infect systems and steals data without installing any file onto the victim&#
Publish At:2014-08-09 17:01 | Read:4900 | Comments:0 | Tags:Cyber Crime Malware Cybercrime GData Hacking malware Powelik


Share high-quality web security related articles with you:)


Tag Cloud