What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Nozomi.webp 2022-12-15 06:44:06 Tracking Malicious Glupteba Activity Through the Blockchain (lien direct) >Glupteba is a trojan horse typically deployed via malicious installers and software cracks. It is a modular malware operators can use to perform a wide range of tasks. Surprisingly, Glupteba leverages the Bitcoin blockchain to distribute its C&C domains. Malware ★★
Nozomi.webp 2022-12-06 09:26:19 Technical Analysis of the Winbox Payload in WindiGo (lien direct) >WindiGo is a malware that exploits CVE-2018-14847 to gain access to MikroTik routers, which has been used in several campaigns by multiple actors. This blog provides a technical analysis of WindiGo as well as Indicators of Compromise (IoCs) you can use to detect WindiGo in your network. Malware ★★★
Nozomi.webp 2022-11-29 14:00:00 How IoT Botnets Evade Detection and Analysis – Part 2 (lien direct) >Nozomi Networks Labs analyzed 728 malware samples, collected from our Internet of Things (IoT) honeypots over the course of 15 days, to discover new modification techniques malware authors are using to evade detection. Malware ★★★
Nozomi.webp 2022-11-02 09:00:23 Could Threat Actors Be Downgrading Their Malware to Evade Detection? (lien direct) >Threat actors are known to modify their malware to evade detection and make additional profits. They do this by changing the file name and IP address, along with other features. This gives them an advantage, as it makes detection more difficult and helps them stay under the radar. The modifications are so common that we […] Malware Threat
Nozomi.webp 2022-08-30 20:41:00 Automatic Restoration of Corrupted UPX-packed Samples (lien direct) >Nozomi Networks Labs scans the web on a daily basis and monitors new techniques that Internet of Things (IoT) malware developers introduce to deceive automated code analysis systems. In most cases, these threats are relatively simple and can be easily bypassed when the sample is manually analyzed in the debugger. However, it can be a […] Malware
Last update at: 2024-05-31 23:08:22
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter