Malware analysis

Virtual Machine Introspection in Malware Analysis

What is Virtual Machine Introspection? The word "introspection" generally refers to the observation and examination of one's own mental and emotional state.

BabaYaga and the Rise of Malware-Destroying Malware

1. Introduction The team working behind Wordfence (a security plugin for WordPress websites) discovered a new type of malware called BabaYaga. It bears the n

Mirai botnet evolution since its source code is available online

Mirai – The evolving IoT threat Since the release of the source code of the Mirai botnet, crooks have improved their own versions by implementing new functio

The VPNFilter: A Powerful Botnet of More Than 500k Devices Ready to Attack

VPNFilter botnet - The discovery Security researchers at Talos group, along with colleagues from other cybersecurity firms and law enforcement agencies, have

The Rowhammer: the Evolution of a Dangerous Attack

The Rowhammer Attack Back in 2015, security researchers at Google's Project Zero team demonstrated how to hijack an Intel-compatible PCs running Linux by exp

Crooks Exploit Facebook to Spread Crypto-miner Malware

Social networks are a privileged attack vector that could be used by cybercriminals to spread malware to a wide audience. In the last month's security expert

YARA: Simple and effective way of dissecting malware

In this article, we will learn about the YARA tool, which gives a very simple and highly effective way of identifying and classifying malware. We all know th

Threat hunting – Malware/angler EK analysis with security onion - GOOFUS AND GALLANT

This is a lab analysis based on the resources available on malware.trafficanalysis.net and publicly available information on threat hunting/malware analysis.

Threat Hunting – Malspam –Japan Office Infected

This is a lab that is conducted in a test bed. The resources were downloaded from malware.trafficanalysis.net. The samples provided came from a case study of

Meltdown and Spectre Patches: a story of delays, lies, and failures

The beginning On January 3, white hackers from Google Project Zero have disclosed some vulnerabilities in Intel chips called Meltdown (CVE-2017-5754) and Spe