Malware: What is spyware?

| | Malware Analysis
Introduction Many things in life come with their downsides, and unfortunately, the internet is one of them. Spyware is an unavoidable (without proper measures) thorn for those traversing the web and... Go ...

Malware: What are Trojans?

| | Malware Analysis
Introduction The term “Trojan horse” is normally associated with the ancient Greek story of “The Iliad,” so why is there a type of malware called a Trojan horse? This is done on ...

Malware Spotlight: What is adware?

| | Malware Analysis
Introduction Face it — we’ve all been there. You’re blissfully surfing away on the internet and then suddenly your web browser starts popping up windows for advertisements out of seemingly nowhere.... Go ...

Ransomware analysis with Volatility

| | Malware Analysis
Introduction In this article, we’ll discuss the Volatility framework and how to perform analysis on ransomware using it. We’ll discuss various capabilities of the tool that can allow us to perform... Go ...

Virtual Machine Introspection in Malware Analysis – LibVMI

| | Malware Analysis
In the last article in this series, we have seen what Virtual Machine Introspection is and how it works in general. Now, in this article, we’ll see how we can set up ...

The Value of Online Malware Collections

| | Malware Analysis
The Problem with Malware One of the biggest security threats to a modern business is a malware outbreak. The risk of its occurrence is fairly high, thanks to the prevalence of malware-spam ...

Virtual Machine Introspection in Malware Analysis

| | Malware Analysis
What is Virtual Machine Introspection? The word “introspection” generally refers to the observation and examination of one’s own mental and emotional state. It is considered as the... Go on to the site ...

BabaYaga and the Rise of Malware-Destroying Malware

| | Malware Analysis
1. Introduction The team working behind Wordfence (a security plugin for WordPress websites) discovered a new type of malware called BabaYaga. It bears the name of a mythical Slavic creature and... Go ...
Malware analysis: decoding Emotet, part 1

Malware analysis: decoding Emotet, part 1

In the first part of this two-part analysis of Emotet, we look at the VBA code, where you'll learn how to recognize and discard "dead" code thrown in to complicate the analysis ...

The Rowhammer – the evolution of a dangerous attack over the years

The Rowhammer attack Back in 2015, security researchers at Google’s Project Zero team demonstrated how to hijack an Intel-compatible PCs running Linux by exploiting the physical weaknesses in... Go on to the ...
Loading...