Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Security BSides London 2019, Terry Bishop's 'Inside Magecart: Their Web Skimming Tactics Revealed' →

September 05, 2019 by Marc Handelman in BSides London 2019, Conferences, Education, Information Security, Malware

Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube.

September 05, 2019 /Marc Handelman
BSides London 2019, Conferences, Education, Information Security, Malware

Security BSides London 2019, Stuart McMurray's 'Offensive Pcap' →

September 02, 2019 by Marc Handelman in BSides London 2019, Conferences, Education, Information Security, Malware, Malware Research, Network Security, Network Protocols, Packet Sniffing API

Many thanks to Security BSides London for publishing their outstanding conference videos on YouTube.

September 02, 2019 /Marc Handelman
BSides London 2019, Conferences, Education, Information Security, Malware, Malware Research, Network Security, Network Protocols, Packet Sniffing API

IBM: From Bad To Worse, Ransomeware Destructive Malware Attacks Have Doubled

August 06, 2019 by Marc Handelman in Intelligence Sharing, Information Security, Malware, Malware Research

via Camille Singleton, writing at SecurityIntelligence, details a report (you will need to create an IBMID. Saving grace: it's free) issued by IBM's XForce, illuminating the rapid increase of Wiper-type destructuve ransomeware attacks. Read It and Weep.

"Destructive malware that disables access to data or destroys system functions has been expanding across geographies and industries over the past few years. Organizations previously thought safe from this form of cyber aggression increasingly find themselves affected, either directly or indirectly." via the IBM XSS IRIS Report" Combating Destructive Malware - Lessons From The Front Lines"

August 06, 2019 /Marc Handelman
Intelligence Sharing, Information Security, Malware, Malware Research

Image Courtesy of Pixabay

Low-Hanging, The Fruits Are

July 16, 2019 by Marc Handelman in Low-Hanging Fruit, Malware, Information Security, Crime, Criminal Enterprise, Must Read

via Threatpost author Lindsey O'Donnell, come this remarkably lucid, well crafted interview piece dissecting the nature of low-hanging fruits, where the fruits under scrutiny are in fact cities themselves, specifically - Atlanta. Ensconced (if you will) in the Peach State... Most certainly Today's Must Read.

July 16, 2019 /Marc Handelman
Low-Hanging Fruit, Malware, Information Security, Crime, Criminal Enterprise, Must Read

LinkedIn Jobs, The Malign Effect

February 28, 2019 by Marc Handelman in Information Security, Malware, Malware Detection

Fake Jobs, leading to malware infections, that is. Microsoft Corporation (Nasdaq: MSFT) and it's LinkedIn unit must focus on protecting their product, which of course, are LinkedIn members. Read all about it at Proofpoint and via Graham Cluley writing at BitDefender. H/T

"Since the middle of 2018, Proofpoint has been tracking campaigns abusing legitimate messaging services, offering fake jobs, and repeatedly following up via email to ultimately deliver the More_eggs backdoor." - via the Proofpoint Threat Insight Team, wrtiting at the comapny's blog with the post entitled "Fake Jobs: Campaigns Delivering More_eggs Backdoor via Fake Job Offers"

February 28, 2019 /Marc Handelman
Information Security, Malware, Malware Detection

We are sure this image is not the multi-tool referred to in this posting!

If At First You Do Not Succeed... Try, Try Again: Russian VPNFilter Malware

October 23, 2018 by Marc Handelman in Jack Of All Trades, Malware, Malware Research, Information Security, Must Read

Sean Gallagher, writing at Ars Technica, regales us with the tale of VPNFilter - The Multi-Tool of Russian Cyber-Miscreants. Today's Must Read!

October 23, 2018 /Marc Handelman
Jack Of All Trades, Malware, Malware Research, Information Security, Must Read

GRRCon Augusta 2018, Ankur Tyagi's 'Analyzing Multi-Dimensional Malware Dataset' →

October 08, 2018 by Marc Handelman in Irongeek, Information Security, GrrCon Augusta, Education, Conferences, Malware, Malware Research

Videography Credit: Irongeek (Adrian Crenshaw).

October 08, 2018 /Marc Handelman
Irongeek, Information Security, GrrCon Augusta, Education, Conferences, Malware, Malware Research

GrrCon Augusta 2018, Adam Hogan's 'Malware Mitigation Sample Detonation Intelligence Automation: Make Your Binaries Work for You' →

September 23, 2018 by Marc Handelman in Irongeek, Information Security, Education, Conferences, GrrCon Augusta, Malware, Malware Detection

Videography Credit: Irongeek (Adrian Crenshaw).

September 23, 2018 /Marc Handelman
Irongeek, Information Security, Education, Conferences, GrrCon Augusta, Malware, Malware Detection

US District Court Judge To State of Georgia: Bad, Bad, Double-Bad

September 18, 2018 by Marc Handelman in Vulnerable Systems, Vulnerabilities, Malware, Malware Detection, Elections, Election Security, Election Manipulation, Election Fraud, Electioneering

via Cyrus Farivar, writing at Ars Technica, of the apparent displeasure noted by United States District Court Judge Amy Totenberg, whilst Her Honor viewed the shenanigans being perpertrated by the State of Georgia's voting commision. Suprised? Don't be.. The centuries lomg tradition of election manipulations is coming to the fore, as the aft begins sinking under it's own weight of corruption, down south, that is. That said, the North, West and East aren't exactly doing that much better. Read Cyrus's superb reportage and weep for free, unfettered elections.

September 18, 2018 /Marc Handelman
Vulnerable Systems, Vulnerabilities, Malware, Malware Detection, Elections, Election Security, Election Manipulation, Election Fraud, Electioneering

BlueHat IL 2018, Marion Marschalek 's 'The Wolf in SGX Clothing' →

February 07, 2018 by Marc Handelman in Education, Information Security, Malware, Malware Detection, Research, Security Research, BlueHat IL, Conferences
February 07, 2018 /Marc Handelman
Education, Information Security, Malware, Malware Detection, Research, Security Research, BlueHat IL, Conferences

Yes, Virgina, Malicious Advertising Growth in Numbers and Viciousness Is Startling →

February 04, 2018 by Marc Handelman in Malicious Advertising, Malvertising, Malware, Malware Detection, Information Security, Cybersecurity

Dan Goodin, writing at our beloved Ars Technica, reports on the startling large numbers of malicious advertising exploits and the subsequent malevolence of same. Unfortunately, Today's Must Read.

February 04, 2018 /Marc Handelman
Malicious Advertising, Malvertising, Malware, Malware Detection, Information Security, Cybersecurity

Maleware, Airborne →

September 29, 2017 by Marc Handelman in All is Information, Malware, Malware Detection, Information Security

aIRJumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras and Infrared (IR)

September 29, 2017 /Marc Handelman
All is Information, Malware, Malware Detection, Information Security

USENIX Enigma 2017 — Tudor Dumitras' 'FeatureSmith: Learning to Detect Malware by Mining the Security Literature' →

August 31, 2017 by Marc Handelman in Alternate Attack Analysis, All is Information, Conferences, Education, Information Security, Malware, Malware Detection, Data Mining, Data Driven Security, Data Discovery
August 31, 2017 /Marc Handelman
Alternate Attack Analysis, All is Information, Conferences, Education, Information Security, Malware, Malware Detection, Data Mining, Data Driven Security, Data Discovery

Deoxyribonucleic Acid, Malware Edition →

August 14, 2017 by Marc Handelman in Alternate Attack Vectors, Biomimetic Malware Attack, Malware, Information Security

via the illustrative writing of John Timmer at ArsTechnica, we learn of the latest malware infect vector - encoded malware within the genomic strands of Deoxyribonucleic Acid (DNA). Has the Fear set in?

August 14, 2017 /Marc Handelman
Alternate Attack Vectors, Biomimetic Malware Attack, Malware, Information Security

Dok'd

July 26, 2017 by Marc Handelman in Research, Malware

MAC users take note, there's evil malware in the wild - and - according to Checkpoint's Ofer Caspi of the highly competent Checkpoint Malware Research Team, the bits in question are not just pernicous, but tenacious as well, and, interestingly, specifically targeting Mac users. Dubbed OSX/Dok it's time to update your virus prophylaxis on your MAC, forthwith.

The OSX/Dok malware is distributed via a phishing campaign, which is usually not a new or surprising attack vector, however this time it targets specifically macOS users, who are mostly perceived as malware-proof. This phishing campaign is combined with a MiTM attack, allowing complete access to all victim communication, even if it’s SSL encrypted. - via Checkpoint's Ofer Caspi - Checkpoint Malware Research Team

July 26, 2017 /Marc Handelman
Research, Malware

Pokémon, The Pikachu Infect →

July 19, 2016 by Marc Handelman in All is Information, Information Security, Malware

News, via Dan Goodin, writing at ArsTechnica, tells the tale of a newly discovered Pokémon Go impostor application on the Google Play store. Oops...

Researchers from antivirus provider Eset report finding at least three such apps in the Google-hosted marketplace. - via Dan Goodin writing at ArsTechnica

July 19, 2016 /Marc Handelman
All is Information, Information Security, Malware

Fifty Percent

June 27, 2016 by Marc Handelman in All is Information, Malware, Malicious Advertising, Information Security

HelpNet Security tells the tale of malicous web advertising, calcualting a stunning figure: Fifty percent of all web advertising is now evil. Is it any wonder that ad blockers now number in the most popular applications used on both mobile and desktop systems?

June 27, 2016 /Marc Handelman /Source
All is Information, Malware, Malicious Advertising, Information Security
fire.jpg

"Unauthorized Code" In Juniper Firewalls, The Decryption Litany →

December 18, 2015 by Marc Handelman in All is Information, Intelligence, Espionage, Malware

via the inimitable Dan Goodin and writing at Ars Technica, wherein the good Mr. Goodin, in a display of remarkable restraint, tells the tale of the discovery of code (in this case not 'authorized') making itself at home in Juniper network componentry. In this case, firewall network componentry. Ooops

December 18, 2015 /Marc Handelman
All is Information, Intelligence, Espionage, Malware

La Chronique de Dork

December 09, 2015 by Marc Handelman in All is Information, Malware, Information Security

Ryan De Souza, writing at HackRead, provides a Chronicle of Dorkbot, maleware most pernicious; and it's announced temporary disruption. Better, I suppose, disrupted, than the alternative.

December 09, 2015 /Marc Handelman /Source
All is Information, Malware, Information Security

Blackhat 2015, Peculiarities of Nation-State Malware Research

September 16, 2015 by Marc Handelman in Information Security, Espionage, All is Information, Malware, Research, Security Research
September 16, 2015 /Marc Handelman /Source
Information Security, Espionage, All is Information, Malware, Research, Security Research
  • Newer
  • Older