Announcement

Collapse
No announcement yet.

Articles

Collapse

CMS Home Page

  • Filter
  • Time
  • Show
Clear All
new posts

  • Calisto Trojan for macOS

    Calisto Trojan for macOS

    As researchers we interesting in developmental prototypes of malware that have had limited distribution or not even occurred in the wild. We recently came across one such sample: a macOS backdoor that we named Calisto.

    More...
    See more | Go to post

  • Online generators… of dashed expectations

    Online generators… of dashed expectations

    Quite recently, we started to designate an entire class of sites — gift card generators — as fraudulent, despite their not stealing any money or personal data from visitors. Why? Let's try to unpick these sites and see how they work.

    More...
    See more | Go to post

  • The return of Fantomas, or how we deciphered Cryakl

    The return of Fantomas, or how we deciphered Cryakl

    This spring marked the fourth anniversary of the malware's first attacks. Against the backdrop of a general decline in ransomware activity (see our report), we decided to return to the topic of Cryakl and tell in detail about how one of the most eye-catching members of this endangered species evolved.

    More...
    See more | Go to post

  • In cryptoland, trust can be costly

    In cryptoland, trust can be costly

    While the legal status of cryptocurrencies and laws to regulate them continue to be hammered out, scammers are busy exploiting the digital gold rush. Besides hacking cryptocurrency exchanges, exploiting smart-contract vulnerabilities, and deploying malicious miners, cybercriminals are also resorting to more traditional social-engineering methods that can reap millions of dollars.

    More...
    See more | Go to post

  • Coinvault, the court case

    Coinvault, the court case

    Today, after almost 3 years of waiting, it was finally the day of the trial. In the Netherlands, where the whole case took place, the hearings are open to the public. Meaning anyone who is interested can visit. And it was quite busy.

    More...
    See more | Go to post

  • APT Trends Report Q2 2018

    APT Trends Report Q2 2018

    These summaries are a representative snapshot of what has been discussed in greater detail in our private reports during Q2 2018. They aim to highlight the significant events and findings that we feel people should be aware of.

    More...
    See more | Go to post

  • To crypt, or to mine – that is the question

    To crypt, or to mine – that is the question

    Way back in 2013 our malware analysts spotted the first malicious samples related to the Trojan-Ransom.Win32.Rakhni family. That was the starting point for this long-lived Trojan family, which is still functioning to this day. Now the criminals have decided to add a new feature to their creation – a mining capability.

    More...
    See more | Go to post

  • Delving deep into VBScript

    Delving deep into VBScript

    In late April we found and wrote a description of CVE-2018-8174, a new zero-day vulnerability for Internet Explorer that uses a well-known technique from the PoC exploit CVE-2014-6332. But whereas CVE-2014-6332 was aimed at integer overflow exploitation for writing to arbitrary memory locations, my interest lay in how this technique was adapted to exploit the use-after-free vulnerability.

    More...
    See more | Go to post

  • Ransomware and malicious crypto miners in 2016-2018

    Ransomware and malicious crypto miners in 2016-2018

    This report will examine what is hopefully ransomware’s last breath, in detail, along with the rise of mining. The report covers the period April 2017 to March 2018, and compares it with April 2016 – March 2017.

    More...
    See more | Go to post

  • Pbot: evolving adware

    Pbot: evolving adware

    It was more than a year ago that we detected the first member of Pbot family. Since then, we have encountered several modifications of the program, one of which went beyond adware by installing and running a hidden miner on victim computers.

    More...
    See more | Go to post
There are no articles in this category.
  • Filter
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.

Categories

Collapse

Article Tags

Collapse

Latest Articles

Collapse

  • Calisto Trojan for macOS
    willie
    As researchers we interesting in developmental prototypes of malware that have had limited distribution or not even occurred in the wild. We recently came across one such sample: a macOS backdoor that we named Calisto.

    More...
    Yesterday, 16:42
  • Online generators… of dashed expectations
    willie
    Quite recently, we started to designate an entire class of sites — gift card generators — as fraudulent, despite their not stealing any money or personal data from visitors. Why? Let's try to unpick these sites and see how they work.

    More...
    19-07-2018, 10:05
  • The return of Fantomas, or how we deciphered Cryakl
    willie
    This spring marked the fourth anniversary of the malware's first attacks. Against the backdrop of a general decline in ransomware activity (see our report), we decided to return to the topic of Cryakl and tell in detail about how one of the most eye-catching members of this endangered species evolved.

    More...
    17-07-2018, 13:10
  • In cryptoland, trust can be costly
    willie
    While the legal status of cryptocurrencies and laws to regulate them continue to be hammered out, scammers are busy exploiting the digital gold rush. Besides hacking cryptocurrency exchanges, exploiting smart-contract vulnerabilities, and deploying malicious miners, cybercriminals are also resorting to more traditional social-engineering methods that can reap millions of dollars.

    More...
    15-07-2018, 10:59
  • Coinvault, the court case
    willie
    Today, after almost 3 years of waiting, it was finally the day of the trial. In the Netherlands, where the whole case took place, the hearings are open to the public. Meaning anyone who is interested can visit. And it was quite busy.

    More...
    13-07-2018, 18:03
  • APT Trends Report Q2 2018
    willie
    These summaries are a representative snapshot of what has been discussed in greater detail in our private reports during Q2 2018. They aim to highlight the significant events and findings that we feel people should be aware of.

    More...
    11-07-2018, 10:36
Working...
X