|
You are here |
blog.talosintelligence.com | ||
| | | | |
intezer.com
|
|
| | | | | Symbiote is a new Linux® malware we discovered that acts in a parasitic nature, infecting other running processes to inflict damage on machines. | |
| | | | |
forensicitguy.github.io
|
|
| | | | | In a previous blog post I mentioned how adversaries using VHD files to distribute malware can leave around a lot more data than they intend, including identifiable data for tracking. In this post I want to break out the best friend everyone made during SANS FOR508, Plaso, so I can process the filesystem data for a malicious VHD and illustrate how we can establish a timeline of operations for the adversary. Just like last time, the sample I'm working with is here in MalwareBazaar: https://bazaar.abuse.ch/sample/72ba4bd27c5d95912ac5e572849f0aaf56c5873e03f5596cb82e56ac879e3614/. | |
| | | | |
www.welivesecurity.com
|
|
| | | | | ESET researchers uncover an active malicious campaign in Latin America that uses new versions of old malware, Bandook, to spy on its victims. | |
| | | | |
www.talosintelligence.com
|
|
| | | The Talos Reputation Center detects and correlates threats in real time using the largest threat detection network in the world spanning web requests, emails, malware samples, open-source data sets, endpoint intelligence, and network intrusions. | ||