First off, many thanks goes out to Paul for doing all of the legwork on this new discovery! A new pack has emerged called EgyPack. The malicious link points to, what looks like a JPEG file (careful, it may still be live): hxxp://img130.imagehacks.es/img130/801/banner.jpeg?id=f8cdedaf861396068a58ab5a7f026e74 But it’s hardly an image file: The author(s) appear to be very much into self-promotion as
Free course demos allow you to see course content, watch world-class instructors in action, and evaluate course difficulty.
We have just received the first samples of malware trying to ride on the death of Osama bin Laden. A file called Fotos_Osama_Bin_Laden.zip is being spammed via e-mail. The archive contains a file called Fotos_Osama_Bin_Laden.exe (md5: d57a1ef18383a8684c525cf415588490). Of course, running this file won't show pictures of dead bin Laden. Instead it executes a banking trojan belonging to the Banload
Topic created on: May 2, 2011 21:17 CDT by SeedyAdams . I created this script to help with malware analysis. The script will compare the executable imports against a list of known malware observable and rename functions accordingly. The link to the .rar is: http://dl.dropbox.com/u/27797885/Mal_function_rename.rar
Secunia delivers software security research that provides reliable, curated and actionable vulnerability intelligence. Organizations can expect to receive standardized, validated and enriched vulnerability research on a specific version of a software product. Secunia Research supports four solutions:
Unmask Parasites - Check your web pages for hidden links, iframes, malicious scripts, unauthorized redirects and other signs of security problems. This investigation began a few weeks ago, when I came across the following two threads in website security forums: [badwarebusters.org] Lately I have been seeing a huge increase in the number of hacked sites appearing on google image search results that
A new malware distribution campaign is producing rogue emails purporting to come from the FBI and attempting to scare users into opening malicious attachments. Cyber criminals behind this attack are hoping to scare people into believing they are being investigated by federal authorities because they accessed illegal online content. The subject of the rogue emails reads "you visit illegal websites"
This is the second installment of a multi-part series examining the tools and tactics used by attackers in the RSA breach and other recent network intrusions characterized as “ultra-sophisticated” and “advanced persistent threats.” If you missed the first piece, please check out Advanced Persistent Tweets: Zero-Day in 140 Characters. The recent data breach at security industry giant RSA was disco
マルウェア作者:エフセキュアに監視させてホフを悩ませるな! 2011年04月29日14:13 ツイート fsecure_corporation ヘルシンキ発 by:ミカ・スタルバーグ この間、我々はマルウェア作者たちがチャック・ノリスが大のお気に入りらしいことに気づいた。当然だ。チャック・ノリスは強烈なのだ! 我々はこの状況を慎重にモニタリングし、ノリス氏に対するある種の興味、あるいは敬意を示すマルウェアをいくつか見つけた。 我々は考え始めた。我々のオートメーションがチャック・ノリスに対する言及を探すことでマルウェアを検出することができるなら、我々は他に何をすることができるだろうか? そして我々は気づいた。デビッド・ハッセルホフへの言及を探す必要がある、と。よく考えれば明白だ! Picture (C) F-Secure Corporation 確かに、「ホフ」に言及するマルウェアが存在す
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く