Nowadays every security bloggers is writing about how Regin (it should be read as Re-Gen, like regeneration), a new sofisticate targeted attacks discovered by Symantec (here), works and how it spied several thousands of PC mostly in Russia, Germany and Middle East. I wont write about its “hidden 6 stages” Malware or about its incredibly […]Read more "ReGeneration (Regin) Targeted Attack"
I am not used to write “Malware centric” posts, contrary I do love to focalize my writing on specific techniques used by Malware to infect systems and/or to evade analysis. However today, I want to stamp in my digital diary WireLurker since I see a “paradigm shift” on it. I find it a super fascinating […]Read more "WireLurker, a shock in Apple World."
During my talks and during my daily working life people asks me about the most interesting Malware used to perform Advanced Persistent Targeted Attacks (APTA). So I decided to give my personal answer in this post, beeing concious that things would change pretty soon. Lets start with Stuxnet, maybe one of the most known APTA […]Read more "The Most Famous Malwares in APTA"
Test if you are vulnerable Nothing really to add here. It makes me just thinking…. those things still happens (thxG). More here, here, here, here and here UPDATE (click to enlarge): From PasteBin (here) No Way… Wondering of many triggering vector would be out there UPDATE 2 After some days from the original 6271, […]Read more "Bash Vulnearbility: CVE-2014-6271"
One of the most important rules in building dynamic analysis environments is to avoid internet connection by the “potential malicious code”. Indeed the “potential malicious code” would try to exploit the analysis system per se if an internet connection is available. To respect this basic rule, when a sandboxed code tries to open an internet […]Read more "Nice Way To Evade Dynamic Analysis"
A “mandatory” step to achieve a complete and successful targeted attack is the so called: “Cyber Intelligence Phase”. By definition every targeted attack owns at leeast one specific characteristic which makes it perfectly fit for a given target. As you might want agree, one of the most important activities on develping a targeted attack is […]Read more "Cyber Intelligence abusing Internet Explorer to perform Targeted Attacks"
As you might see from my posts frequency, last months have been pretty busy to me. My hacking team and I are working really hard and we are achieving incredibly results which makes me happy but really busy as well. OpenSSL CCS Attack (CVE-2014-0224) is almost one month old and not super interesting to be […]Read more "OpenSSL CCS Attack"
After the big success obtained through MalControl open source software, people asked me to record a simple video to show how it’s supposed to work. I did use screencast this time. This short quick’n dirty video shows how MalControl is supposed working. Please refer to the original GitHub page (https://github.com/marcoramilli/malcontrol) for every needs, tickets, request […]Read more "MalControl Video"
Gathering open data from malware analysis websites is the main target of Malware Control Monitor project. Visualize such a data by synthesize statistics highlighting where threats happen and what their impact is, could be useful to identify malware propagations. Open Data: We actually scrape the following services: malwr phishtank urlquery virscan webinspector If you […]Read more "Say Hello to MalControl: Malware Control Monitor"
Just a quick note to my readers from London. I’ll attend InfoSec London 2014, if you want to have a beer or share some “Security Thoughts” I’ll be more then happy. Just drop me an email I’ll answer you shortly. While I’ll be most of my time in M96 Stand, I’ll try to attend some […]Read more "InfoSec London 2014"