APT Tag

The Olympic Destroyer cyberattack is a very recent and notable attack by sophisticated threat actors against a globally renowned 2-week sporting event that takes place once every four years in a different part of the world. Successfully attacking the Winter Olympics requires motivation, planning, resources...

Come see us at Black Hat USA in Las Vegas in the Business Hall (booth 120) during the Black Hat USA two-day main event on August 3 and 4.  Engin Kirda, Giovanni Vigna, and Chris Kruegel  (executive team co-founders, and well known in the industry) will be...

It was a busy day for those in the Lastline booth (H178) at Infosecurity Europe on the first day. This is the event's 21st year  A talented group of Lastline employees spanning two continents and a handful of countries gathered to demonstrate and...

Sophisticated attackers can find their way into a corporate network in many ways. An attack could come from an external source, through the exploitation of a service, or by being brought in by a user whose laptop has been infected while traveling. As the network infrastructure...

Bridging static and dynamic analysis using Lastline process snapshotting Authored by: Arunpreet Singh and Dr. Christopher Kruegel   Scareware is a type of malware that takes advantage of people’s fear of revealing their private information, losing their critical data, or facing irreversible...

Authored by: Arunpreet Singh and Clemens Kolbitsch The use of runtime-packing of malware has long become the standard to defeat traditional AV products. At the same time, malicious programs are continuously becoming more evasive to avoid being detected by first-generation sandboxes. New waves of malware are now combining these...

Authored by: Clemens Kolbitsch and Arunpreet Singh Another week comes to an end, another wave of evasive malware is attacking users. This week: Shifu. This malware family, termed an Uber Patchwork of Malware Tools in a recent DarkReading post, combines a plethora of evasive tricks to bypass traditional analysis systems,...

Authored by: Arunpreet Singh, Clemens Kolbitsch The Turla malware family is part of one of the most sophisticated malware families seen in the wild today. Given that the APT group behind this malware is suspected to be state-sponsored, the sophistication of the malicious code comes at no...