Analyzing a banking Trojan
In our effort to detect threats to the users of Android devices, we analyze a lot of malicious apps. This...
In our effort to detect threats to the users of Android devices, we analyze a lot of malicious apps. This...
An area where we spend quite some effort here at Lastline is scaling up our malware analysis capabilities, that is...
Automated malware analysis systems (or sandboxes) are one of the latest weapons in the arsenal of security vendors. Such systems...
Researchers from UCSB and University of Bonn recently published a paper on the risks incurred by dynamically loaded external...
A look at Zeus Trojan variant called Citadel evading traditional sandboxes Fighting traditional sandboxes (or dynamic analysis systems in general) typically...
Looking at how malware analysis engines evolved over the last decade, the trend is quite obvious: Dynamic analysis systems are...
Malware has always been in continuous evolution: Throughout the years we have seen simple viruses become polymorphic, autonomous self-replicating code connecting to...
Authored by: Roman Vasilenko, Kyle Creyts Introduction There are a number of articles recently written about a Remote Access Trojan called PlugX or Korplug (with older variants...
Authored by: Roman Vasilenko, Kyle Creyts The Initial Infection Vector - Nuclear Pack...
This is an necessary category.
This is an non-necessary category.