Malware analysis

Regin: State-Sponsored Malware or Cybercrime?

Regin, a highly advanced spying tool A few weeks ago, Symantec security firm published the results of its investigation on the backdoor Regin, a highly advan

A History of Malware: Part Three, 1993-1999

In my previous article, I explained what happened to the evolution of malware when microcomputers started to become a major presence in small offices and hou

A History of Malware: Part Two, 1989-1992

In my previous article, I told the story of the very first worms and viruses. Interestingly, a groundbreaking mathemetician, John von Neumann, and a science

A History of Malware: Part One, 1949-1988

These days, malware is an everyday concern, even among ordinary end users. A countless amount of money is lost every year worldwide due to malware, possibly

NSA Backdoor Part 2, BULLDOZER: And, Learn How to DIY a NSA Hardware Implant

This article is the second part of a series on NSA BIOS Backdoor internals. This part focuses on BULLDOZER, a hardware implant acting as malware dropper and

Java bytecode reverse engineering

This article is designed to show how to crack a Java executable by disassembling the corresponding bytes code. Disassembling Java bytecode is the act of tran

Portable Malware Lab for Beginners – Part 2

In the previous article, "Portable Malware Lab for Beginners," I spoke about nested virtual machines, i.e., deploying a virtual machine with QEMU and Cuckoo.

The Hunt for Memory Malware

Memory forensic is a skill to find out all the artifacts in the memory that is present in the running computer. It is an interesting method to find out what

Botnets Unearthed – The ZEUS BOT

Zeus, also known as ZBot/WSNPoem, is famous for stealing banking information by using man in the browser keystroke logging and form grabbing. As the term sug

Gauss: Between technology and politics

Introduction The purpose of this work is to present the reader research of the Gauss malware platform as one of the ultimate nation-state cyber exploitation