The Latest in IT Security

Posts Tagged ‘Obfuscation’

Exploit kits available in the wild tend to follow a trend by exploiting vulnerabilities reported in various browser components which are commonly deployed. Recently, we have seen an increase in exploitation of a year old vulnerability reported in the JRE component of JAVA (CVE-2012-1723). Exploitation of this vulnerability in JRE allows a attacker to download malware […]

Read more ...

Nymaim – Obfuscation Chronicles Introduction Last month, my colleague Sebastien Duquette detailed the home campaign, a long-lasting operation consisting of compromised web servers running a malicious Apache module named Darkleech (detected by ESET as Linux/Chapro) that redirects visitors to a Blackhole exploit kit. Sebastien stated that one of the final payloads dropped by this operation […]

Read more ...

We have been fighting the W32.Changeup family of worms for a long time and have written about it many times   Figure 1. W32.Changeup prevalence   One characteristic of W32.Changeup is that it is written in Microsoft Visual Basic 6.0 and the viral part of its program code is seen in the program file, but […]

Read more ...

MONDAY, JULY 06, 2015

Latest Comments

Social Networks