Agar.io - An Epic Browser Game
Obviously this isn't a gaming blog, but i felt like this deserved a mention as most of the MalwareTech IRC has been addicted to it for the past few days (me included). The game is very simple: You're a...
View ArticleMS14-066 In Depth Analysis
A few days ago I published an article detailing how a second bug, in the schannel TLS handshake handling, could allow an attacker to trigger the DecodeSigAndReverse heap overflow in an application that...
View ArticleWindows 10 System Call Stub Changes
Recently I installed Windows 10 RTM and while I was digging around I happened to notice some changes to the user mode portion of the system call stub: these changes appear to break the current methods...
View ArticleDarkode Returns Following International Raids
When I was contacted asking for a comment about the darkode raid, I'd said that the main administrator was not arrested and that'd I'd be surprised if it wasn't back within a week; well It's been a...
View ArticleDavid Cameron Wants Porn Sites to Require Banking Information
It would seem that David Cameron doesn't have a tech advisory or even knows anyone who uses browser other than Netscape, but that doesn't seem stop him with his endless stream of proposals and laws to...
View ArticleUser Mode Hook Scanner (Alpha)
I finally decided to write my first security tool based on an idea I had for advanced hook detection, I couldn't find any evidence of the method being used so I based a tool around it. It's still a...
View ArticleCreating the Ultimate Tor Virtual Network
Although the methods in this article can be used for proper anonymity outside of the tor browser, the main focus is creating a secure tor based research environment. As most security researchers know...
View ArticleAdvanced Desktop Application Sandboxing via AppContainer
This post is kind of a follow on from my previous article Usermode Sandboxing, so if you've not yet read that you should do so first.AppContainer was a fairly quietly introduced feature in Windows 8,...
View ArticleHidden VNC for Beginners
Hidden VNC is a creative solution to a solution to a problem which stemmed from banking fraud. Back years ago when fraud was uncommon, most banks only had basic IP or Geo-location checks to flag or...
View ArticleDevice Guard - The Beginning of the End for Malware?
Finally I manage to put together a computer capable of running Device Guard and I've had a little bit of time to play around with the code signing part. Everyone is probably already familiar with x64...
View ArticleKelihos Analysis - Part 1
In the recent years I've noticed a shift in the malware economy from botnets to ransomware, which is likely due to the AV industry employing more aggressive tactics against botnets resulting in a drop...
View ArticleRegarding Kelihos Research
I had planned to continue posting a series of articles detailing my findings from looking into the Kelihos botnet (namely the peer-to-peer protocol). Although my intentions were only to crawl the...
View ArticleExploring Peer to Peer Botnets
Peer to Peer and Everything In betweenBack in October I'd gotten bored of the endless stream of cryptolockers and PoS trojan, so decided to look at something old school, that something was Kelihos....
View ArticleBackdoored Ransomware for Educational Purposes
Here is an interesting article I found this week, it's about how A researcher released two pieces of 'educational' ransomware which were secretly backdoored in order to own some advanced and prolific...
View ArticleWhen Scriptkiddies Attack
Usually I don't blog about the hundreds of ridiculous or down right crazy emails I receive each year, but this exchange makes all the others seem completely reasonable in comparison. Normally my...
View ArticleNecurs.P2P - A New Hybrid Peer-to-Peer Botnet
Last week I received a tip about a sample displaying some indication that it could be peer-to-peer (a large amount of UDP traffic being sent to residential IPs), after a couple days of analysis I was...
View ArticleDDoSing with Other People's Botnets
While I was reverse engineering ZeroAccess in order to write a monitoring system, I had an idea which would allow me to use ZeroAccess C&C infrastructure to reflect and amplify a UDP based DDoS...
View ArticleLet's Analyze: Dridex (Part 1)
Due to popular request I'm starting a new reverse engineering article series which will detail how I go about analyzing various samples, instead of just presenting my findings like I normally do. Most...
View ArticleLet's Analyze: Dridex (Part 2)
In the previous article we went over how to dump the names of the majority of functions dridex resolves dynamically to complicate analysis. Today we will be using some similar methods to get the other...
View ArticleLet's Analyze: Dridex (Part 3)
Sorry for the longer than expected delay, occasionally the Dridex group will take the servers offline during the weekend and resume normal operations on Monday; however, it appears they decided to...
View Article