Become The Malware Analyst Series: Malicious Code Extraction and Deobfuscation

In this video, Senior Incident Response & Research Consultant Scott Nusbaum demonstrates a method to extract and deobfuscate code from a malicious document. Upon rendering the code readable, Nusbaum works to gain an understanding of the goals the malware was attempting to accomplish and the processes by which it undertook that effort. This video is…

The post Become The Malware Analyst Series: Malicious Code Extraction and Deobfuscation appeared first on TrustedSec.

Continue reading Become The Malware Analyst Series: Malicious Code Extraction and Deobfuscation

Agent Tesla: What it is, how it works and why it’s targeting energy companies

Introduction to Agent Tesla Agent Tesla appeared for the first time in 2014, but it has been just recently used for attacks on energy companies operating in various fields. These fields include…
Go on to the site to read the full article
The post Age… Continue reading Agent Tesla: What it is, how it works and why it’s targeting energy companies

Emerging Ransomware Targets Photos, Videos on Android Devices

The CryCryptor malware strain is a brand-new family of threats, leveraging COVID-19 to spread. Continue reading Emerging Ransomware Targets Photos, Videos on Android Devices

PoetRAT malware: what it is, how it works and how to prevent it | Malware spotlight

Introduction As new malware constantly emerges, some have been taking advantage of recent events to make it easier to establish a foothold on a targeted system and wage a cyberattack. Once such…
Go on to the site to read the full article
The post Poe… Continue reading PoetRAT malware: what it is, how it works and how to prevent it | Malware spotlight

Grandoreiro malware: what it is, how it works and how to prevent it | Malware spotlight

Introduction One of the few things that attracts the attention of malware researchers more than novel types of malware is malware that expands its attack horizon to new areas of the globe. Couple…
Go on to the site to read the full article
The post G… Continue reading Grandoreiro malware: what it is, how it works and how to prevent it | Malware spotlight

BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction to BazarBackdoor BazarBackdoor is a new malware with the ability to install various types of malicious programs on the infected computers. It is believed to be created by the developers…
Go on to the site to read the full article
The pos… Continue reading BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight

Encryption Utility Firm Accused of Bundling Malware Functions in Product

The increasingly prevalent GuLoader malware has been traced back to a far-reaching encryption service that attempts to pass as above-board. Continue reading Encryption Utility Firm Accused of Bundling Malware Functions in Product