Endpoint Security Locky Ransomware: New Evasion Techniques Discovered June 30, 2016 by arpit | 95 Comments on Locky Ransomware: New Evasion Techniques Discovered Cyberbit’s Advanced Malware Research Group has recently discovered new evasion techniques used in the new Locky ransomware campaign. Locky, one of the most dominant ransomware, has recently reappeared in the wild after a pause of several weeks. The new campaign introduces new techniques for evading automatic analysis systems, such as virtualized sandboxes. FireEye analyzed one […] Read more » Locky Ransomware
OT Security How this Attack on a German SCADA Network Could Have Been Prevented June 23, 2016 by arpit | 110 Comments on How this Attack on a German SCADA Network Could Have Been Prevented In December, 2014 the German Federal Office for Information Security notified about a malicious attack on a steel mill operated by a German based company. The attack was initiated using spear phishing. Attackers gained access to the corporate network and moved into the plant network. According to the report, the adversary, showing extensive knowledge of […] Read more »
Endpoint Security Serialization Vulnerabilities Explained June 6, 2016 by arpit | 90 Comments on Serialization Vulnerabilities Explained Remote code execution Overview Serialization is a useful and widely supported feature. However, it also provides an easy target for hackers to try and execute malicious commands using the external shell. This article will demonstrate, by using code samples, how serialization vulnerabilities can be exploited to execute commands remotely, and how, by implementing secure coding […] Read more »