More Insights on the Recent Korean Cyber Attacks (Trojan.Hastati)
It is interesting to see how this malware attack in Korea focuses on wiping and destruction rather than information or data stealing. This attack is as much a cyber rampage as it is a cyber attack. In...
View ArticleOperation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method
Recently, we discovered a new IE zero-day exploit in the wild, which has been used in a strategic Web compromise. Specifically, the attackers inserted this zero-day exploit into a strategically...
View ArticleTuring Test in Reverse: New Sandbox-Evasion Techniques Seek Human Interaction
Last year, we published a paper titled Hot Knives Through Butter, Evading File-Based Sandboxes. In this paper, we explained many sandbox evasion methods–and today’s blog post adds to our growing...
View ArticleThe Path to Mass-Producing Cyber Attacks
Lines of people, lines of parts. The modern production line is composed of individuals contributing to a larger process. This common manufacturing approach is efficient, effective, and profitable. Now...
View Article