Skip to content
  • YouTube
  • TikTok
  • Twitter
  • Instagram

MalwareTech

Everything Cyber Security

  • Sponsors
  • Speaking
  • Content
    • Podcast
    • Challenges
  • Contact
Opinions

Why Open Source Ransomware is Such a Problem

December 30, 2016November 21, 2021

A while back 2sec4u posted a poll asking if people considered open source ransomware helpful to detection and prevention, with 46% voting yes. Although the poll wasn’t

Read More
Malware Analysis Threat Intelligence

Mapping Mirai: A Botnet Case Study

October 3, 2016November 21, 2021

Mirai is a piece of malware designed to hijack busybox systems (commonly used on IoT devices) in order to perform DDoS attacks, it’s also the

Read More
Threat Intelligence

Dridex Returns to the UK With Updated TTPs

September 27, 2016November 21, 2021

With the exception of a few unconfirmed reports of Dridex targeting Baltic countries (which doesn’t make much sense economically), infection campaigns have ceased since mid

Read More
Threat Intelligence

Significant Increase in Kelihos Botnet Activity

August 24, 2016March 4, 2019

Since the Kelihos takedown in front of a live audience at RSA Conference in 2013, the operator had opted to maintain a low profile by keeping

Read More
Uncategorized

No the FBI Are Not Sending Bitcoins to the Shadowbrokers

August 22, 2016August 22, 2016

A few days ago someone made the following post which suggested the FBI were sending bitcoin from the wallet where all of the seized coins from Silkroad

Read More
Uncategorized

Automatic Transfer Systems (ATS) for Beginners

August 16, 2016August 16, 2016

ATS is one of the newer techniques employed by banking malware that not many people are familiar with so I thought I’d do a small post

Read More
Threat Intelligence

What’s Happening with Necurs, Dridex, and Locky?

June 21, 2016November 21, 2021

Around the 8th of June VICE picked up the story about Necurs’ downtime and wrote a great article including a tweet from Kevin Beaumont referencing

Read More
Malware Analysis Reverse Engineering

How Cerber’s Hash Factory Works

June 6, 2016November 21, 2021

Recently I saw a story on SecurityWeek about how the Cerber ransomware morphs every 15 seconds (each download results in a file with a new hash),

Read More
Personal Stories

Infosec Without a Degree

May 31, 2016March 4, 2019

I’ve seen plenty blogs from people who got into infosec through the academic route, so i figured I’d cover the other side and try to

Read More
Malware Analysis Threat Intelligence

Dridex Updates Payload Distribution

May 20, 2016November 21, 2021

Dridex spreads mainly using Office documents containing malicious macros, initially the primary stage would involve using VBA (Visual Basic for Applications) to download and execute

Read More

Posts navigation

Previous 1 2 3 4 … 11 Next

  • Twitter

  • Youtube

  • Twitch

  • Discord

  • Instagram

  • RSS
  • Donations




    Categories

    • For Beginners
    • Hacking
    • Malware Analysis
    • News
    • Opinions
    • Personal Stories
    • Reverse Engineering
    • Threat Intelligence
    • Uncategorized
    • Videos
    • Vulnerability Research
    Copyright MalwareTech 2022