malware   13295

« earlier     later »

LoL client mines bitcoin
League of Legends in SE Asia is surreptitiously mining bitcoin
badtech  malware  lol  leagueoflegends  riotgames  garena 
6 weeks ago by nelson
Twitter
Will there be enough with over a billion connected things ???
Cybersec  5G  iot  virus  malware  from twitter_favs
6 weeks ago by TomRaftery
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
In our research we found at least one attack against a company leveraging a Microsoft Office Excel document with an embedded macro to launch the malware. Interestingly, the delivery document borrowed a technique which was publicized in late 2017 as being used by the Sofacy threat actors, embedding the main malicious code in a EXIF metadata property of the document.

By doing so, the main content of the macro itself (Figure 2) can be kept relatively simple, and the malicious’ codes small footprint can help enable evasion of automated detection mechanisms based on macro content.
cybersecurity  malware  office  exif  backdoor 
6 weeks ago by bwiese
glmcdona/Process-Dump: Windows tool for dumping malware PE files from memory back to disk for analysis.
Process Dump works for Windows 32 and 64 bit operating systems and can dump memory components from specific processes or from all processes currently running. Process Dump supports creation and use of a clean-hash database, so that dumping of all the clean files such as kernel32.dll can be skipped. It's main features include:
malware  memory  github 
7 weeks ago by whip_lash

« earlier    later »

related tags

'cosiloon'  2018  5g  9/11  ads  adversaries  advertising  affect  allege  analysis  analytics  android  anti-virus  anti  antivirus  apple  apps  apt  arstechnica  article  asymmetrical  attack  attacks  avast  aws  aws_security  backdoor  backup  bad  badtech  begun  beware  blacklist  blowback  books  botnet  bucket  bug  built  burp  business  c2  cable  cables  can  certificates  charger  chrome  cia  cisco  collector  computer  conan  cordcutting  country  crime  criptovalute  crtc  ctf  cyber_warfare  cyberattacks  cybersec  cybersecurity  cyberwarfare  cylance  david_sanger  detection  dhs  docker  dragos  ec2  ecommerce  elf  encoding  eso  espionage  exif  extensions  fbi  federation  fileless  firmware  fordjbatman  forensics  gadgets  games  garena  github  global  gps  hackers  hacking  has  home  ics  in  incident  independent  infosec  injector  intelligence  interconnections  international  internet  iot  jpeg  keychain  kodi  laptops  latest  leagueoflegends  linksys  linux  lol  low-cost  low-priced  maas  mac  machinelearning  memory  microsoft  mikrotik  military  miscalculations  more  mysterybot  nas  nederland  netgear  network  networking  news  north_korea  northkorea  northkorean  nyt  of  office  online  opensource  opm  oracle  osx  packer  passwords  pdf  pentesting  pestudio  phishing  phone  phones  piratage  politics  powershell  pre-installed  privacy  qnap  reboot  reddit  reference  reports  repository  research  response  reverse-engineering  reverseengineering  riotgames  router  routers  russia  russian  s3  sample  says  scan  scanner  security  security_&_intelligence  server  shipped  si  site  skynet  small  smartphones  software  some  sophos  source  sourcecode  spam  spunti  spyware  ssl  stats  status  strings  submarine  submission  sysadmin  talos  tech  techcrunch  technology  terrorism  tests  that  to  tool  tools  tplink  traffic  travel  trisis  troubleshoot  troubleshooting  tutorials  type:challenge  type:collection  typeframe  ukraine  urgent  urlquery  usaf  utilities  vectors  version  via-diigo  via-ifttt  via-pocket  virus  virustotal  volatility  vpn  vpnfilter  vulnerabilities  vulnerability  webserver  website_management  whitelist  wi-fi  wikipedia  with  wordpres  wordpress  wwi   

Copy this bookmark:



description:


tags: