Crime Marches On

 
What a long way we’ve come since the days of simply relying on firewalls. Just as threats have evolved—from an attack called Morris Worm to an attack called POODLE—so have the strategies and tools for both hackers and businesses, as the cyberwar rages on. When you look at the rate at which new malware is being crafted and the rate at which adequate security technologies are being embraced, there is a widening gulf. Accepting status quo or thinking past security efforts have you covered doesn’t cut it anymore. Developing a greater understanding of the threat landscape is a good and important first step.   The number of zero-day malware is growing, while the adoption of ...

Matsnu: A Deep Dive

 
Check Point researcher Stanislav Skuratovich recently analyzed a malware called “Matsnu”, an x86 infector that acts as a backdoor after it infiltrates a computer system. This malware is able to upload and execute any code on the infected system. This uploaded code could potentially encrypt files on disc or steal sensitive data. The malware author(s) used a technique called DGA (Domain Generation Algorithm) to communicate with the C&C server, protecting the malware image from any attempted string dumping, blacklisting dumped domains, or shutting down domains. DGA makes blocking malicious network activities more difficult, because new domains are generated for specified amounts of ...